<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-04-29T06:38:54</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20094112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4112</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4112" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4112" ref_url="https://www.suse.com/security/cve/CVE-2009-4112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Cacti 0.8.7e and earlier allows remote authenticated administrators to gain privileges by modifying the "Data Input Method" for the "Linux - Get Memory Usage" setting to contain arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4112/">CVE-2009-4112</cve>
	<bugzilla href="https://bugzilla.suse.com/1122535">SUSE bug 1122535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558664">SUSE bug 558664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14266-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-202014266-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00065.html" source="SUSE-SU"/>
    <description>
    mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767</cve>
	<bugzilla href="https://bugzilla.suse.com/1156944">SUSE bug 1156944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603745" comment="apache2-mod_perl-2.0.11-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151816" comment="apache2-mod_perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603746" comment="apache2-mod_perl-devel-2.0.11-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009271141" comment="apache2-mod_perl-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3389</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0114-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0122-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7001524" ref_url="https://www.suse.com/support/kb/doc/?id=7001524" source="SUSE-SU"/>
		<reference ref_id="TID7009901" ref_url="https://www.suse.com/support/kb/doc/?id=7009901" source="SUSE-SU"/>
		<reference ref_id="TID7015841" ref_url="https://www.suse.com/support/kb/doc/?id=7015841" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7022397" ref_url="https://www.suse.com/support/kb/doc/?id=7022397" source="SUSE-SU"/>
		<reference ref_id="TID7022454" ref_url="https://www.suse.com/support/kb/doc/?id=7022454" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0063-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<bugzilla href="https://bugzilla.suse.com/716002">SUSE bug 716002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719047">SUSE bug 719047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725167">SUSE bug 725167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726096">SUSE bug 726096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739248">SUSE bug 739248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739256">SUSE bug 739256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742306">SUSE bug 742306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759666">SUSE bug 759666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763598">SUSE bug 763598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4944</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<bugzilla href="https://bugzilla.suse.com/754447">SUSE bug 754447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0845</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<bugzilla href="https://bugzilla.suse.com/747125">SUSE bug 747125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1150</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755383">SUSE bug 755383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826682">SUSE bug 826682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6708</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6708" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6708" ref_url="https://www.suse.com/security/cve/CVE-2012-6708" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '&lt;' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '&lt;' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2012-6708/">CVE-2012-6708</cve>
	<bugzilla href="https://bugzilla.suse.com/1111661">SUSE bug 1111661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607294" comment="libruby2_5-2_5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607295" comment="ruby2.5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607296" comment="ruby2.5-devel-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607297" comment="ruby2.5-devel-extra-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607298" comment="ruby2.5-doc-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607299" comment="ruby2.5-doc-ri-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607300" comment="ruby2.5-stdlib-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 "Independently Fixable" in the CVE Counting Decisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4238</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1437-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1438-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1440-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1462-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1463-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882915">SUSE bug 882915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10401</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10401" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10401" ref_url="https://www.suse.com/security/cve/CVE-2014-10401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007805.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMGB54ZNHPYCQOCNFWII4FF7QYGHLHOE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43QNN7Q3HNDCS2NCHIGGBFFQET5XKUHO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-10401/">CVE-2014-10401</cve>
	<bugzilla href="https://bugzilla.suse.com/1176492">SUSE bug 1176492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606346" comment="perl-DBI-1.639-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10402</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10402" ref_url="https://www.suse.com/security/cve/CVE-2014-10402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007805.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMGB54ZNHPYCQOCNFWII4FF7QYGHLHOE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43QNN7Q3HNDCS2NCHIGGBFFQET5XKUHO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-10402/">CVE-2014-10402</cve>
	<bugzilla href="https://bugzilla.suse.com/1176492">SUSE bug 1176492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606346" comment="perl-DBI-1.639-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2667</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0596-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0597-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667</cve>
	<bugzilla href="https://bugzilla.suse.com/871152">SUSE bug 871152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2905</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2905" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2905" ref_url="https://www.suse.com/security/cve/CVE-2014-2905" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html" source="SUSE-SU"/>
    <description>
    fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the credentials, which allows local users to gain privileges via the universal variable socket, related to /tmp/fishd.socket.user permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2905/">CVE-2014-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603020" comment="fish3-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265402" comment="fish3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603021" comment="fish3-devel-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265403" comment="fish3-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2906</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2906" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2906" ref_url="https://www.suse.com/security/cve/CVE-2014-2906" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html" source="SUSE-SU"/>
    <description>
    The psub function in fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly create temporary files, which allows local users to execute arbitrary commands via a temporary file with a predictable name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2906/">CVE-2014-2906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603020" comment="fish3-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265402" comment="fish3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603021" comment="fish3-devel-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265403" comment="fish3-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2914</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2914" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2914" ref_url="https://www.suse.com/security/cve/CVE-2014-2914" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html" source="SUSE-SU"/>
    <description>
    fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2914/">CVE-2014-2914</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603020" comment="fish3-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265402" comment="fish3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603021" comment="fish3-devel-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265403" comment="fish3-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3219</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3219" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3219" ref_url="https://www.suse.com/security/cve/CVE-2014-3219" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html" source="SUSE-SU"/>
    <description>
    fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3219/">CVE-2014-3219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603020" comment="fish3-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265402" comment="fish3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603021" comment="fish3-devel-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265403" comment="fish3-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3577</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html" source="SUSE-SU"/>
    <description>
    org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577</cve>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606086" comment="apache-commons-httpclient-3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151783" comment="apache-commons-httpclient is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606087" comment="apache-commons-httpclient-demo-3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298607" comment="apache-commons-httpclient-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606088" comment="apache-commons-httpclient-javadoc-3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298608" comment="apache-commons-httpclient-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606089" comment="apache-commons-httpclient-manual-3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298609" comment="apache-commons-httpclient-manual is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3856</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3856" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3856" ref_url="https://www.suse.com/security/cve/CVE-2014-3856" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00071.html" source="SUSE-SU"/>
    <description>
    The funced function in fish (aka fish-shell) 1.23.0 before 2.1.1 does not properly create temporary files, which allows local users to gain privileges via a temporary file with a predictable name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3856/">CVE-2014-3856</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603020" comment="fish3-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265402" comment="fish3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603021" comment="fish3-devel-3.0.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265403" comment="fish3-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1042-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1046-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1070-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4141</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4143</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5262</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html" source="SUSE-SU"/>
    <description>
    http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262</cve>
	<bugzilla href="https://bugzilla.suse.com/1120767">SUSE bug 1120767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606086" comment="apache-commons-httpclient-3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151783" comment="apache-commons-httpclient is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606087" comment="apache-commons-httpclient-demo-3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298607" comment="apache-commons-httpclient-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606088" comment="apache-commons-httpclient-javadoc-3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298608" comment="apache-commons-httpclient-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606089" comment="apache-commons-httpclient-manual-3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298609" comment="apache-commons-httpclient-manual is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8041</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<bugzilla href="https://bugzilla.suse.com/937419">SUSE bug 937419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9251</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9251" ref_url="https://www.suse.com/security/cve/CVE-2015-9251" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-9251/">CVE-2015-9251</cve>
	<bugzilla href="https://bugzilla.suse.com/1099458">SUSE bug 1099458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100133">SUSE bug 1100133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111660">SUSE bug 1111660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607294" comment="libruby2_5-2_5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607295" comment="ruby2.5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607296" comment="ruby2.5-devel-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607297" comment="ruby2.5-devel-extra-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607298" comment="ruby2.5-doc-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607299" comment="ruby2.5-doc-ri-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607300" comment="ruby2.5-stdlib-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9275" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9275" ref_url="https://www.suse.com/security/cve/CVE-2015-9275" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00048.html" source="SUSE-SU"/>
    <description>
    ARC 5.21q allows directory traversal via a full pathname in an archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9275/">CVE-2015-9275</cve>
	<bugzilla href="https://bugzilla.suse.com/1121032">SUSE bug 1121032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609616" comment="arc-5.21q-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277005" comment="arc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0772</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000110</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10937</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10937" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10937" ref_url="https://www.suse.com/security/cve/CVE-2016-10937" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0673-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00002.html" source="SUSE-SU"/>
    <description>
    IMAPFilter through 2.6.12 does not validate the hostname in an SSL certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10937/">CVE-2016-10937</cve>
	<bugzilla href="https://bugzilla.suse.com/1149931">SUSE bug 1149931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607974" comment="imapfilter-2.6.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283658" comment="imapfilter is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3189</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1206-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00056.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601306" comment="bzip2-1.0.6-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151380" comment="bzip2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601307" comment="bzip2-doc-1.0.6-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253604" comment="bzip2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601308" comment="libbz2-1-1.0.6-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151382" comment="libbz2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601309" comment="libbz2-1-32bit-1.0.6-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151383" comment="libbz2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601310" comment="libbz2-devel-1.0.6-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151384" comment="libbz2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601311" comment="libbz2-devel-32bit-1.0.6-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253605" comment="libbz2-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5195</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2657-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2659-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2673-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="TID7018178" ref_url="https://www.suse.com/support/kb/doc/?id=7018178" source="SUSE-SU"/>
		<reference ref_id="TID7018287" ref_url="https://www.suse.com/support/kb/doc/?id=7018287" source="SUSE-SU"/>
		<reference ref_id="TID7022455" ref_url="https://www.suse.com/support/kb/doc/?id=7022455" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
    <description>
    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004419">SUSE bug 1004419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004436">SUSE bug 1004436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006323">SUSE bug 1006323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006695">SUSE bug 1006695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008110">SUSE bug 1008110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030118">SUSE bug 1030118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607614" comment="cri-o-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281964" comment="cri-o is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607615" comment="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281965" comment="cri-o-kubeadm-criconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607616" comment="cri-tools-1.18.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281966" comment="cri-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607617" comment="go1.14-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607618" comment="go1.14-doc-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607619" comment="go1.14-race-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607620" comment="kubernetes-apiserver-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281971" comment="kubernetes-apiserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607621" comment="kubernetes-client-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281972" comment="kubernetes-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607622" comment="kubernetes-controller-manager-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281973" comment="kubernetes-controller-manager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607623" comment="kubernetes-kubeadm-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281974" comment="kubernetes-kubeadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607624" comment="kubernetes-kubelet-common-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281975" comment="kubernetes-kubelet-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607625" comment="kubernetes-kubelet1.17-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281976" comment="kubernetes-kubelet1.17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607626" comment="kubernetes-kubelet1.18-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281977" comment="kubernetes-kubelet1.18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607627" comment="kubernetes-master-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281978" comment="kubernetes-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607628" comment="kubernetes-node-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281979" comment="kubernetes-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607629" comment="kubernetes-proxy-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281980" comment="kubernetes-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607630" comment="kubernetes-scheduler-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281981" comment="kubernetes-scheduler is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5636</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<bugzilla href="https://bugzilla.suse.com/1065451">SUSE bug 1065451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106262">SUSE bug 1106262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5699</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985351">SUSE bug 985351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6328</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6328" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608454" comment="libexif-devel-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608455" comment="libexif-devel-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279253" comment="libexif-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608456" comment="libexif12-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608457" comment="libexif12-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8859</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8859" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8859" ref_url="https://www.suse.com/security/cve/CVE-2016-8859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0222-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8859/">CVE-2016-8859</cve>
	<bugzilla href="https://bugzilla.suse.com/1005483">SUSE bug 1005483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607614" comment="cri-o-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281964" comment="cri-o is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607615" comment="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281965" comment="cri-o-kubeadm-criconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607616" comment="cri-tools-1.18.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281966" comment="cri-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607617" comment="go1.14-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607618" comment="go1.14-doc-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607619" comment="go1.14-race-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607620" comment="kubernetes-apiserver-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281971" comment="kubernetes-apiserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607621" comment="kubernetes-client-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281972" comment="kubernetes-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607622" comment="kubernetes-controller-manager-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281973" comment="kubernetes-controller-manager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607623" comment="kubernetes-kubeadm-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281974" comment="kubernetes-kubeadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607624" comment="kubernetes-kubelet-common-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281975" comment="kubernetes-kubelet-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607625" comment="kubernetes-kubelet1.17-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281976" comment="kubernetes-kubelet1.17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607626" comment="kubernetes-kubelet1.18-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281977" comment="kubernetes-kubelet1.18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607627" comment="kubernetes-master-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281978" comment="kubernetes-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607628" comment="kubernetes-node-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281979" comment="kubernetes-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607629" comment="kubernetes-proxy-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281980" comment="kubernetes-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607630" comment="kubernetes-scheduler-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281981" comment="kubernetes-scheduler is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9180</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html" source="SUSE-SU"/>
    <description>
    perl-XML-Twig: The option to `expand_external_ents`, documented as controlling external entity expansion in XML::Twig does not work. External entities are always expanded, regardless of the option's setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180</cve>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604590" comment="perl-XML-Twig-3.52-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289040" comment="perl-XML-Twig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9398</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9398" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9399</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9399" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The calcstepsizes function in jpc_dec.c in JasPer 1.900.22 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399</cve>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer over-read was observed in "l2cap_dump" function in "tools/parser/l2cap.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797</cve>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601344" comment="bluez-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165944" comment="bluez is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601345" comment="bluez-auto-enable-devices-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242424" comment="bluez-auto-enable-devices is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601346" comment="bluez-cups-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165946" comment="bluez-cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601347" comment="bluez-devel-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165948" comment="bluez-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601348" comment="bluez-devel-32bit-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165950" comment="bluez-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601349" comment="bluez-test-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165952" comment="bluez-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601350" comment="libbluetooth3-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601351" comment="libbluetooth3-32bit-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165956" comment="libbluetooth3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9798</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2588-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00072.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a use-after-free was identified in "conf_opt" function in "tools/parser/l2cap.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798</cve>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603790" comment="bluez-5.48-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165944" comment="bluez is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603791" comment="bluez-auto-enable-devices-5.48-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242424" comment="bluez-auto-enable-devices is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603792" comment="bluez-cups-5.48-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165946" comment="bluez-cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603793" comment="bluez-devel-5.48-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165948" comment="bluez-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603794" comment="bluez-devel-32bit-5.48-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165950" comment="bluez-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603795" comment="bluez-test-5.48-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165952" comment="bluez-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603796" comment="libbluetooth3-5.48-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603797" comment="libbluetooth3-32bit-5.48-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165956" comment="libbluetooth3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9802" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802</cve>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601344" comment="bluez-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165944" comment="bluez is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601345" comment="bluez-auto-enable-devices-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242424" comment="bluez-auto-enable-devices is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601346" comment="bluez-cups-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165946" comment="bluez-cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601347" comment="bluez-devel-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165948" comment="bluez-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601348" comment="bluez-devel-32bit-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165950" comment="bluez-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601349" comment="bluez-test-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165952" comment="bluez-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601350" comment="libbluetooth3-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601351" comment="libbluetooth3-32bit-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165956" comment="libbluetooth3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9917</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9917" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "read_n" function in "tools/hcidump.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917</cve>
	<bugzilla href="https://bugzilla.suse.com/1015171">SUSE bug 1015171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601344" comment="bluez-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165944" comment="bluez is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601345" comment="bluez-auto-enable-devices-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242424" comment="bluez-auto-enable-devices is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601346" comment="bluez-cups-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165946" comment="bluez-cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601347" comment="bluez-devel-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165948" comment="bluez-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601348" comment="bluez-devel-32bit-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165950" comment="bluez-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601349" comment="bluez-test-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165952" comment="bluez-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601350" comment="libbluetooth3-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601351" comment="libbluetooth3-32bit-5.48-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165956" comment="libbluetooth3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000126</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000126" ref_url="https://www.suse.com/security/cve/CVE-2017-1000126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    exiv2 0.26 contains a Stack out of bounds read in webp parser
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000126/">CVE-2017-1000126</cve>
	<bugzilla href="https://bugzilla.suse.com/1068873">SUSE bug 1068873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000231</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000231" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000231" ref_url="https://www.suse.com/security/cve/CVE-2017-1000231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00000.html" source="SUSE-SU"/>
    <description>
    A double-free vulnerability in parse.c in ldns 1.7.0 have unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000231/">CVE-2017-1000231</cve>
	<bugzilla href="https://bugzilla.suse.com/1068711">SUSE bug 1068711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607332" comment="ldns-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280952" comment="ldns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607333" comment="ldns-devel-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280953" comment="ldns-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607334" comment="libldns2-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280954" comment="libldns2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607335" comment="perl-DNS-LDNS-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280955" comment="perl-DNS-LDNS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607336" comment="python3-ldns-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280956" comment="python3-ldns is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000232</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000232" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000232" ref_url="https://www.suse.com/security/cve/CVE-2017-1000232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00000.html" source="SUSE-SU"/>
    <description>
    A double-free vulnerability in str2host.c in ldns 1.7.0 have unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000232/">CVE-2017-1000232</cve>
	<bugzilla href="https://bugzilla.suse.com/1068709">SUSE bug 1068709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607332" comment="ldns-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280952" comment="ldns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607333" comment="ldns-devel-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280953" comment="ldns-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607334" comment="libldns2-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280954" comment="libldns2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607335" comment="perl-DNS-LDNS-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280955" comment="perl-DNS-LDNS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607336" comment="python3-ldns-1.7.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280956" comment="python3-ldns is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171002101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1002101</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1002101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1002101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1002101" ref_url="https://www.suse.com/security/cve/CVE-2017-1002101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
    <description>
    In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1002101/">CVE-2017-1002101</cve>
	<bugzilla href="https://bugzilla.suse.com/1084923">SUSE bug 1084923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085007">SUSE bug 1085007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085009">SUSE bug 1085009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096726">SUSE bug 1096726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607614" comment="cri-o-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281964" comment="cri-o is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607615" comment="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281965" comment="cri-o-kubeadm-criconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607616" comment="cri-tools-1.18.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281966" comment="cri-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607617" comment="go1.14-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607618" comment="go1.14-doc-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607619" comment="go1.14-race-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607620" comment="kubernetes-apiserver-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281971" comment="kubernetes-apiserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607621" comment="kubernetes-client-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281972" comment="kubernetes-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607622" comment="kubernetes-controller-manager-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281973" comment="kubernetes-controller-manager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607623" comment="kubernetes-kubeadm-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281974" comment="kubernetes-kubeadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607624" comment="kubernetes-kubelet-common-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281975" comment="kubernetes-kubelet-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607625" comment="kubernetes-kubelet1.17-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281976" comment="kubernetes-kubelet1.17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607626" comment="kubernetes-kubelet1.18-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281977" comment="kubernetes-kubelet1.18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607627" comment="kubernetes-master-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281978" comment="kubernetes-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607628" comment="kubernetes-node-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281979" comment="kubernetes-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607629" comment="kubernetes-proxy-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281980" comment="kubernetes-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607630" comment="kubernetes-scheduler-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281981" comment="kubernetes-scheduler is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11104</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11104" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11104" ref_url="https://www.suse.com/security/cve/CVE-2017-11104" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00049.html" source="SUSE-SU"/>
    <description>
    Knot DNS before 2.4.5 and 2.5.x before 2.5.2 contains a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set, because of an improper TSIG validity period check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11104/">CVE-2017-11104</cve>
	<bugzilla href="https://bugzilla.suse.com/1047841">SUSE bug 1047841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604418" comment="knot-1.6.8-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177609" comment="knot is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12481</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12481" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12481" ref_url="https://www.suse.com/security/cve/CVE-2017-12481" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00029.html" source="SUSE-SU"/>
    <description>
    The find_option function in option.cc in Ledger 3.1.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-12481/">CVE-2017-12481</cve>
	<bugzilla href="https://bugzilla.suse.com/1052484">SUSE bug 1052484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601941" comment="ledger-3.1.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260280" comment="ledger is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12482</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12482" ref_url="https://www.suse.com/security/cve/CVE-2017-12482" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00029.html" source="SUSE-SU"/>
    <description>
    The ledger::parse_date_mask_routine function in times.cc in Ledger 3.1.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-12482/">CVE-2017-12482</cve>
	<bugzilla href="https://bugzilla.suse.com/1052478">SUSE bug 1052478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052484">SUSE bug 1052484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601941" comment="ledger-3.1.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260280" comment="ledger is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12911</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12911" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12911" ref_url="https://www.suse.com/security/cve/CVE-2017-12911" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0522-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00030.html" source="SUSE-SU"/>
    <description>
    The "apetag.c" file in MP3Gain 1.5.2.r2 has a vulnerability which results in a stack memory corruption when opening a crafted MP3 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12911/">CVE-2017-12911</cve>
	<bugzilla href="https://bugzilla.suse.com/1082274">SUSE bug 1082274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092152">SUSE bug 1092152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607530" comment="mp3gain-1.6.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281553" comment="mp3gain is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13077</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063963">SUSE bug 1063963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13078</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13079</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13080</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063671">SUSE bug 1063671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178872">SUSE bug 1178872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13081</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13082</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609617" comment="hostapd-2.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13086</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13087</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13088</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13098</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13098" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13098" ref_url="https://www.suse.com/security/cve/CVE-2017-13098" source="SUSE CVE"/>
		<reference ref_id="TID7022561" ref_url="https://www.suse.com/support/kb/doc/?id=7022561" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1689-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0607-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html" source="SUSE-SU"/>
    <description>
    BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as "ROBOT."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13098/">CVE-2017-13098</cve>
	<bugzilla href="https://bugzilla.suse.com/1072697">SUSE bug 1072697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607824" comment="bouncycastle-1.60-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153068" comment="bouncycastle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607825" comment="bouncycastle-javadoc-1.60-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153069" comment="bouncycastle-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14132</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jas_image_ishomosamp function in libjasper/base/jas_image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132</cve>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14988</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14988" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14988" ref_url="https://www.suse.com/security/cve/CVE-2017-14988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005771.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file that is accessed with the ImfOpenInputFile function in IlmImf/ImfCRgbaFile.cpp. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14988/">CVE-2017-14988</cve>
	<bugzilla href="https://bugzilla.suse.com/1061305">SUSE bug 1061305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602474" comment="libIlmImf-2_2-23-2.2.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602475" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602476" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602477" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602478" comment="openexr-2.2.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602479" comment="openexr-devel-2.2.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602480" comment="openexr-doc-2.2.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15107</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006208.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00027.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603877" comment="dnsmasq-2.78-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603878" comment="dnsmasq-utils-2.78-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15298</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15298" ref_url="https://www.suse.com/security/cve/CVE-2017-15298" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Git through 2.14.2 mishandles layers of tree objects, which allows remote attackers to cause a denial of service (memory consumption) via a crafted repository, aka a Git bomb. This can also have an impact of disk consumption; however, an affected process typically would not survive its attempt to build the data structure in memory before writing to disk.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15298/">CVE-2017-15298</cve>
	<bugzilla href="https://bugzilla.suse.com/1063412">SUSE bug 1063412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16808</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16808" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16808" ref_url="https://www.suse.com/security/cve/CVE-2017-16808" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16808/">CVE-2017-16808</cve>
	<bugzilla href="https://bugzilla.suse.com/1068716">SUSE bug 1068716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17555</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17555" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17555" ref_url="https://www.suse.com/security/cve/CVE-2017-17555" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:0470-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0476-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The swri_audio_convert function in audioconvert.c in FFmpeg libswresample through 3.0.101, as used in FFmpeg 3.4.1, aubio 0.4.6, and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17555/">CVE-2017-17555</cve>
	<bugzilla href="https://bugzilla.suse.com/1072366">SUSE bug 1072366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609618" comment="ffmpeg-4-libavcodec-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234594" comment="ffmpeg-4-libavcodec-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609619" comment="ffmpeg-4-libavdevice-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234595" comment="ffmpeg-4-libavdevice-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609620" comment="ffmpeg-4-libavfilter-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234596" comment="ffmpeg-4-libavfilter-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609621" comment="ffmpeg-4-libavformat-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234597" comment="ffmpeg-4-libavformat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609622" comment="ffmpeg-4-libavresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234598" comment="ffmpeg-4-libavresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609623" comment="ffmpeg-4-libavutil-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234599" comment="ffmpeg-4-libavutil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609624" comment="ffmpeg-4-libpostproc-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234600" comment="ffmpeg-4-libpostproc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609625" comment="ffmpeg-4-libswresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234601" comment="ffmpeg-4-libswresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609626" comment="ffmpeg-4-libswscale-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234602" comment="ffmpeg-4-libswscale-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609627" comment="ffmpeg-4-private-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234603" comment="ffmpeg-4-private-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609628" comment="libavcodec58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234604" comment="libavcodec58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510674" comment="libavcodec58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234605" comment="libavcodec58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609629" comment="libavdevice58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234606" comment="libavdevice58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510677" comment="libavdevice58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234607" comment="libavdevice58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609630" comment="libavfilter7-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234608" comment="libavfilter7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510680" comment="libavfilter7-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234609" comment="libavfilter7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609631" comment="libavformat58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234610" comment="libavformat58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510683" comment="libavformat58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234611" comment="libavformat58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609632" comment="libavresample4-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234612" comment="libavresample4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510686" comment="libavresample4-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234613" comment="libavresample4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609633" comment="libavutil56-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234614" comment="libavutil56 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510689" comment="libavutil56-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234615" comment="libavutil56-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609634" comment="libpostproc55-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234616" comment="libpostproc55 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510692" comment="libpostproc55-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234617" comment="libpostproc55-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609635" comment="libswresample3-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234618" comment="libswresample3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510695" comment="libswresample3-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234619" comment="libswresample3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609636" comment="libswscale5-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234620" comment="libswscale5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510698" comment="libswscale5-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234621" comment="libswscale5-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17740</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17740" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" source="SUSE-SU"/>
    <description>
    contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740</cve>
	<bugzilla href="https://bugzilla.suse.com/1073313">SUSE bug 1073313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602825" comment="libldap-2_4-2-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602826" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602827" comment="libldap-data-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602828" comment="openldap2-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602829" comment="openldap2-back-meta-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602830" comment="openldap2-back-perl-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602831" comment="openldap2-back-sock-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602832" comment="openldap2-back-sql-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602833" comment="openldap2-client-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602834" comment="openldap2-contrib-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602835" comment="openldap2-devel-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602836" comment="openldap2-devel-32bit-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602837" comment="openldap2-devel-static-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602838" comment="openldap2-doc-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602839" comment="openldap2-ppolicy-check-password-1.2-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17742</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742</cve>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17784</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17784" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17784" ref_url="https://www.suse.com/security/cve/CVE-2017-17784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKBDGMCM5XJOHFKTACI2CEISBTSKVLD3/" source="SUSE-SU"/>
    <description>
    In GIMP 2.8.22, there is a heap-based buffer over-read in load_image in plug-ins/common/file-gbr.c in the gbr import parser, related to mishandling of UTF-8 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17784/">CVE-2017-17784</cve>
	<bugzilla href="https://bugzilla.suse.com/1073624">SUSE bug 1073624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609484" comment="gimp-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609485" comment="gimp-devel-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609486" comment="gimp-lang-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609487" comment="gimp-plugin-aa-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609488" comment="gimp-plugins-python-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609489" comment="libgimp-2_0-0-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609490" comment="libgimp-2_0-0-32bit-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153689" comment="libgimp-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609491" comment="libgimpui-2_0-0-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609492" comment="libgimpui-2_0-0-32bit-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153690" comment="libgimpui-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17785</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17785" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17785" ref_url="https://www.suse.com/security/cve/CVE-2017-17785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKBDGMCM5XJOHFKTACI2CEISBTSKVLD3/" source="SUSE-SU"/>
    <description>
    In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17785/">CVE-2017-17785</cve>
	<bugzilla href="https://bugzilla.suse.com/1073625">SUSE bug 1073625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609484" comment="gimp-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609485" comment="gimp-devel-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609486" comment="gimp-lang-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609487" comment="gimp-plugin-aa-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609488" comment="gimp-plugins-python-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609489" comment="libgimp-2_0-0-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609490" comment="libgimp-2_0-0-32bit-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153689" comment="libgimp-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609491" comment="libgimpui-2_0-0-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609492" comment="libgimpui-2_0-0-32bit-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153690" comment="libgimpui-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17786</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17786" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17786" ref_url="https://www.suse.com/security/cve/CVE-2017-17786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKBDGMCM5XJOHFKTACI2CEISBTSKVLD3/" source="SUSE-SU"/>
    <description>
    In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17786/">CVE-2017-17786</cve>
	<bugzilla href="https://bugzilla.suse.com/1073626">SUSE bug 1073626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609484" comment="gimp-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609485" comment="gimp-devel-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609486" comment="gimp-lang-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609487" comment="gimp-plugin-aa-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609488" comment="gimp-plugins-python-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609489" comment="libgimp-2_0-0-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609490" comment="libgimp-2_0-0-32bit-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153689" comment="libgimp-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609491" comment="libgimpui-2_0-0-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609492" comment="libgimpui-2_0-0-32bit-2.8.22-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153690" comment="libgimpui-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17787</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17787" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17787" ref_url="https://www.suse.com/security/cve/CVE-2017-17787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3C7V5LBPIDK275MYNBQSOQOYW6KAMBL/" source="SUSE-SU"/>
    <description>
    In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17787/">CVE-2017-17787</cve>
	<bugzilla href="https://bugzilla.suse.com/1073628">SUSE bug 1073628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606926" comment="gimp-2.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606927" comment="gimp-devel-2.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606928" comment="gimp-lang-2.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606929" comment="gimp-plugin-aa-2.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606930" comment="gimp-plugins-python-2.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606931" comment="libgimp-2_0-0-2.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606932" comment="libgimp-2_0-0-32bit-2.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153689" comment="libgimp-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606933" comment="libgimpui-2_0-0-2.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606934" comment="libgimpui-2_0-0-32bit-2.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153690" comment="libgimpui-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17789" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17789" ref_url="https://www.suse.com/security/cve/CVE-2017-17789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007400.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00034.html" source="SUSE-SU"/>
    <description>
    In GIMP 2.8.22, there is a heap-based buffer overflow in read_channel_data in plug-ins/common/file-psp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17789/">CVE-2017-17789</cve>
	<bugzilla href="https://bugzilla.suse.com/1073627">SUSE bug 1073627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605217" comment="gimp-2.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605218" comment="gimp-devel-2.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605219" comment="gimp-lang-2.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605220" comment="gimp-plugin-aa-2.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605221" comment="gimp-plugins-python-2.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151544" comment="gimp-plugins-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605222" comment="libgimp-2_0-0-2.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151545" comment="libgimp-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605223" comment="libgimp-2_0-0-32bit-2.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153689" comment="libgimp-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605224" comment="libgimpui-2_0-0-2.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151546" comment="libgimpui-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605225" comment="libgimpui-2_0-0-32bit-2.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153690" comment="libgimpui-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18207</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18207" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications "need to be prepared to handle a wide variety of exceptions."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18551</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18594</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18594" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18594" ref_url="https://www.suse.com/security/cve/CVE-2017-18594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2425-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2198-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html" source="SUSE-SU"/>
    <description>
    nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18594/">CVE-2017-18594</cve>
	<bugzilla href="https://bugzilla.suse.com/1148742">SUSE bug 1148742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603033" comment="ncat-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253372" comment="ncat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603034" comment="ndiff-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253373" comment="ndiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603035" comment="nmap-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253374" comment="nmap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603036" comment="nping-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253375" comment="nping is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603037" comment="zenmap-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253376" comment="zenmap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18595</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603277" comment="kernel-debug-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603278" comment="kernel-debug-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603279" comment="kernel-debug-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603280" comment="kernel-default-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603281" comment="kernel-default-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603282" comment="kernel-default-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603283" comment="kernel-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603284" comment="kernel-docs-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603285" comment="kernel-docs-html-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603286" comment="kernel-kvmsmall-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603287" comment="kernel-kvmsmall-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603288" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603289" comment="kernel-macros-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603290" comment="kernel-obs-build-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603291" comment="kernel-obs-qa-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603292" comment="kernel-source-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603293" comment="kernel-source-vanilla-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603294" comment="kernel-syms-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603295" comment="kernel-vanilla-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603296" comment="kernel-vanilla-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603297" comment="kernel-vanilla-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18922</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18922" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18926</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18926" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUV22LIOLBYBTTH7G7HNENHDQDYBB4WP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1959-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXCAHUNNGDFKLSCGKPLLGBYG4BM2FW4J/" source="SUSE-SU"/>
    <description>
    raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926</cve>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178784">SUSE bug 1178784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178903">SUSE bug 1178903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183914">SUSE bug 1183914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606174" comment="libraptor-devel-2.0.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299308" comment="libraptor-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606175" comment="libraptor2-0-2.0.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151673" comment="libraptor2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606176" comment="libraptor2-0-32bit-2.0.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299309" comment="libraptor2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606177" comment="raptor-2.0.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299310" comment="raptor is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2579</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2579" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005619.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00056.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in netpbm before 10.61. The expandCodeOntoStack() function has an insufficient code value check, so that a maliciously crafted file could cause the application to crash or possibly allows code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601600" comment="libnetpbm-devel-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153784" comment="libnetpbm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601601" comment="libnetpbm11-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153785" comment="libnetpbm11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601602" comment="libnetpbm11-32bit-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153786" comment="libnetpbm11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601603" comment="netpbm-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153787" comment="netpbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601604" comment="netpbm-vulnerable-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258192" comment="netpbm-vulnerable is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2580</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2580" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005619.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00056.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601600" comment="libnetpbm-devel-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153784" comment="libnetpbm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601601" comment="libnetpbm11-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153785" comment="libnetpbm11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601602" comment="libnetpbm11-32bit-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153786" comment="libnetpbm11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601603" comment="netpbm-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153787" comment="netpbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601604" comment="netpbm-vulnerable-10.80.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258192" comment="netpbm-vulnerable is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2807</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2807" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2807" ref_url="https://www.suse.com/security/cve/CVE-2017-2807" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00029.html" source="SUSE-SU"/>
    <description>
    An exploitable buffer overflow vulnerability exists in the tag parsing functionality of Ledger-CLI 3.1.1. A specially crafted journal file can cause an integer underflow resulting in code execution. An attacker can construct a malicious journal file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2807/">CVE-2017-2807</cve>
	<bugzilla href="https://bugzilla.suse.com/1052484">SUSE bug 1052484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601941" comment="ledger-3.1.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260280" comment="ledger is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2808</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2808" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2808" ref_url="https://www.suse.com/security/cve/CVE-2017-2808" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00029.html" source="SUSE-SU"/>
    <description>
    An exploitable use-after-free vulnerability exists in the account parsing component of the Ledger-CLI 3.1.1. A specially crafted ledger file can cause a use-after-free vulnerability resulting in arbitrary code execution. An attacker can convince a user to load a journal file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2808/">CVE-2017-2808</cve>
	<bugzilla href="https://bugzilla.suse.com/1052484">SUSE bug 1052484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601941" comment="ledger-3.1.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260280" comment="ledger is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3136</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -&gt; 9.8.8-P1, 9.9.0 -&gt; 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.0 -&gt; 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0 -&gt; 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, 9.9.3-S1 -&gt; 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5499</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5499" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libjasper/jpc/jpc_dec.c in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499</cve>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5503</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5503" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The dec_clnpass function in libjasper/jpc/jpc_t1dec.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503</cve>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5504</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5504" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The jpc_undo_roi function in libjasper/jpc/jpc_dec.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504</cve>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5505</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5505" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The jas_matrix_asl function in jas_seq.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505</cve>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7418</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7418" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7418" ref_url="https://www.suse.com/security/cve/CVE-2017-7418" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1836-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html" source="SUSE-SU"/>
    <description>
    ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7418/">CVE-2017-7418</cve>
	<bugzilla href="https://bugzilla.suse.com/1032443">SUSE bug 1032443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609637" comment="proftpd-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153640" comment="proftpd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609638" comment="proftpd-devel-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153641" comment="proftpd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609639" comment="proftpd-doc-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153642" comment="proftpd-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609640" comment="proftpd-lang-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153643" comment="proftpd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609641" comment="proftpd-ldap-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153644" comment="proftpd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609642" comment="proftpd-mysql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153645" comment="proftpd-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609643" comment="proftpd-pgsql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153646" comment="proftpd-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609644" comment="proftpd-radius-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153647" comment="proftpd-radius is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609645" comment="proftpd-sqlite-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153648" comment="proftpd-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7544</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7544" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608454" comment="libexif-devel-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608455" comment="libexif-devel-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279253" comment="libexif-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608456" comment="libexif12-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608457" comment="libexif12-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7607</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7608</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7609</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7609" ref_url="https://www.suse.com/security/cve/CVE-2017-7609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7609/">CVE-2017-7609</cve>
	<bugzilla href="https://bugzilla.suse.com/1033086">SUSE bug 1033086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7610</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7611</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7612</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7613</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8834</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00007.html" source="SUSE-SU"/>
    <description>
    The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834</cve>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608264" comment="libcroco-0.6.12-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257312" comment="libcroco is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608265" comment="libcroco-0_6-3-0.6.12-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177260" comment="libcroco-0_6-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608266" comment="libcroco-0_6-3-32bit-0.6.12-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177261" comment="libcroco-0_6-3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608267" comment="libcroco-devel-0.6.12-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257313" comment="libcroco-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8871</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00007.html" source="SUSE-SU"/>
    <description>
    The cr_parser_parse_selector_core function in cr-parser.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871</cve>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608264" comment="libcroco-0.6.12-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257312" comment="libcroco is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608265" comment="libcroco-0_6-3-0.6.12-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177260" comment="libcroco-0_6-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608266" comment="libcroco-0_6-3-32bit-0.6.12-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177261" comment="libcroco-0_6-3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608267" comment="libcroco-devel-0.6.12-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257313" comment="libcroco-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9103</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9103" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608836" comment="adns-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285802" comment="adns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608837" comment="libadns-devel-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285803" comment="libadns-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608838" comment="libadns-devel-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285804" comment="libadns-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608839" comment="libadns1-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285805" comment="libadns1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608840" comment="libadns1-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285806" comment="libadns1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9104</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9104" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608836" comment="adns-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285802" comment="adns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608837" comment="libadns-devel-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285803" comment="libadns-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608838" comment="libadns-devel-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285804" comment="libadns-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608839" comment="libadns1-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285805" comment="libadns1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608840" comment="libadns1-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285806" comment="libadns1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9105</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9105" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. It corrupts a pointer when a nameserver speaks first because of a wrong number of pointer dereferences. This bug may well be exploitable as a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608836" comment="adns-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285802" comment="adns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608837" comment="libadns-devel-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285803" comment="libadns-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608838" comment="libadns-devel-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285804" comment="libadns-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608839" comment="libadns1-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285805" comment="libadns1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608840" comment="libadns1-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285806" comment="libadns1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9106</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9106" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. adns_rr_info mishandles a bogus *datap. The general pattern for formatting integers is to sprintf into a fixed-size buffer. This is correct if the input is in the right range; if it isn't, the buffer may be overrun (depending on the sizes of the types on the current platform). Of course the inputs ought to be right. And there are pointers in there too, so perhaps one could say that the caller ought to check these things. It may be better to require the caller to make the pointer structure right, but to have the code here be defensive about (and tolerate with an error but without crashing) out-of-range integer values. So: it should defend each of these integer conversion sites with a check for the actual permitted range, and return adns_s_invaliddata if not. The lack of this check causes the SOA sign extension bug to be a serious security problem: the sign extended SOA value is out of range, and overruns the buffer when reconverted. This is related to sign extending SOA 32-bit integer fields, and use of a signed data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608836" comment="adns-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285802" comment="adns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608837" comment="libadns-devel-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285803" comment="libadns-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608838" comment="libadns-devel-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285804" comment="libadns-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608839" comment="libadns1-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285805" comment="libadns1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608840" comment="libadns1-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285806" comment="libadns1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9107</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. It overruns reading a buffer if a domain ends with backslash. If the query domain ended with \, and adns_qf_quoteok_query was specified, qdparselabel would read additional bytes from the buffer and try to treat them as the escape sequence. It would depart the input buffer and start processing many bytes of arbitrary heap data as if it were the query domain. Eventually it would run out of input or find some other kind of error, and declare the query domain invalid. But before then it might outrun available memory and crash. In principle this could be a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608836" comment="adns-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285802" comment="adns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608837" comment="libadns-devel-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285803" comment="libadns-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608838" comment="libadns-devel-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285804" comment="libadns-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608839" comment="libadns1-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285805" comment="libadns1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608840" comment="libadns1-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285806" comment="libadns1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9108</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608836" comment="adns-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285802" comment="adns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608837" comment="libadns-devel-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285803" comment="libadns-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608838" comment="libadns-devel-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285804" comment="libadns-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608839" comment="libadns1-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285805" comment="libadns1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608840" comment="libadns1-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285806" comment="libadns1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9109</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9109" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. It fails to ignore apparent answers before the first RR that was found the first time. when this is fixed, the second answer scan finds the same RRs at the first. Otherwise, adns can be confused by interleaving answers for the CNAME target, with the CNAME itself. In that case the answer data structure (on the heap) can be overrun. With this fixed, it prefers to look only at the answer RRs which come after the CNAME, which is at least arguably correct.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608836" comment="adns-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285802" comment="adns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608837" comment="libadns-devel-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285803" comment="libadns-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608838" comment="libadns-devel-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285804" comment="libadns-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608839" comment="libadns1-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285805" comment="libadns1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608840" comment="libadns1-32bit-1.5.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285806" comment="libadns1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9111</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111</cve>
	<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602024" comment="libIlmImf-2_2-23-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602025" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602026" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602027" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602028" comment="openexr-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602029" comment="openexr-devel-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602030" comment="openexr-doc-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9113</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9113" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113</cve>
	<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602024" comment="libIlmImf-2_2-23-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602025" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602026" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602027" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602028" comment="openexr-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602029" comment="openexr-devel-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602030" comment="openexr-doc-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9115</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 2 in the = operator function in half.h could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115</cve>
	<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602024" comment="libIlmImf-2_2-23-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602025" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602026" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602027" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602028" comment="openexr-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602029" comment="openexr-devel-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602030" comment="openexr-doc-2.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9239</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9239" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9239" ref_url="https://www.suse.com/security/cve/CVE-2017-9239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is incorrect, the program assigns pValue_ to 0x0, and the value of pValue() is 0x0. TiffImageEntry::doWriteImage will use the value of pValue() to cause a segmentation fault. To exploit this vulnerability, someone must open a crafted tiff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9239/">CVE-2017-9239</cve>
	<bugzilla href="https://bugzilla.suse.com/1040973">SUSE bug 1040973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9782</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9782" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jp2_decode function in libjasper/jp2/jp2_dec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782</cve>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9814</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007144.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1215-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html" source="SUSE-SU"/>
    <description>
    cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604343" comment="cairo-devel-1.16.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158149" comment="cairo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604344" comment="cairo-devel-32bit-1.16.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158150" comment="cairo-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604345" comment="cairo-tools-1.16.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158151" comment="cairo-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604346" comment="libcairo-gobject2-1.16.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158152" comment="libcairo-gobject2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604347" comment="libcairo-gobject2-32bit-1.16.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158153" comment="libcairo-gobject2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604348" comment="libcairo-script-interpreter2-1.16.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158154" comment="libcairo-script-interpreter2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604349" comment="libcairo-script-interpreter2-32bit-1.16.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158155" comment="libcairo-script-interpreter2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604350" comment="libcairo2-1.16.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158156" comment="libcairo2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604351" comment="libcairo2-32bit-1.16.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158157" comment="libcairo2-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0734</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3945-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183945-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000073</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location function of package.rb that can result in path traversal when writing to a symlinked basedir outside of the root. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073</cve>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000074</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074</cve>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175764">SUSE bug 1175764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000075</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop.. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075</cve>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000076</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could be installed, as the tarball would contain multiple gem signatures.. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076</cve>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000077</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem could set an invalid homepage URL. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077</cve>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183937">SUSE bug 1183937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000078</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appear to be exploitable via the victim must browse to a malicious gem on a vulnerable gem server. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078</cve>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000079</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation that can result in the gem could write to arbitrary filesystem locations during installation. This attack appear to be exploitable via the victim must install a malicious gem. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079</cve>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000199</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1253-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000613</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000613" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000613" ref_url="https://www.suse.com/security/cve/CVE-2018-1000613" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0607-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html" source="SUSE-SU"/>
    <description>
    Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs 1.58 up to but not including 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000613/">CVE-2018-1000613</cve>
	<bugzilla href="https://bugzilla.suse.com/1096291">SUSE bug 1096291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100694">SUSE bug 1100694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153385">SUSE bug 1153385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607824" comment="bouncycastle-1.60-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153068" comment="bouncycastle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607825" comment="bouncycastle-javadoc-1.60-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153069" comment="bouncycastle-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000622" ref_url="https://www.suse.com/security/cve/CVE-2018-1000622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00031.html" source="SUSE-SU"/>
    <description>
    The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000622/">CVE-2018-1000622</cve>
	<bugzilla href="https://bugzilla.suse.com/1100691">SUSE bug 1100691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603251" comment="cargo-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265404" comment="cargo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603252" comment="cargo-doc-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265405" comment="cargo-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603253" comment="clippy-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265406" comment="clippy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603254" comment="rls-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265407" comment="rls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603255" comment="rust-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238244" comment="rust is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603256" comment="rust-analysis-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265408" comment="rust-analysis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603257" comment="rust-cbindgen-0.8.7-lp151.5.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603258" comment="rust-doc-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238245" comment="rust-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603259" comment="rust-gdb-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238246" comment="rust-gdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603260" comment="rust-src-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238247" comment="rust-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603261" comment="rust-std-static-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265410" comment="rust-std-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603262" comment="rustfmt-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265411" comment="rustfmt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1372-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005515.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1498-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" source="SUSE-SU"/>
    <description>
    GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654</cve>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601392" comment="libtasn1-4.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152119" comment="libtasn1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601393" comment="libtasn1-6-4.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152120" comment="libtasn1-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601394" comment="libtasn1-6-32bit-4.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152121" comment="libtasn1-6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601395" comment="libtasn1-devel-4.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152122" comment="libtasn1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601396" comment="libtasn1-devel-32bit-4.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152787" comment="libtasn1-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000667</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000667" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000667" ref_url="https://www.suse.com/security/cve/CVE-2018-1000667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    NASM nasm-2.13.03 nasm- 2.14rc15 version 2.14rc15 and earlier contains a memory corruption (crashed) of nasm when handling a crafted file due to function assemble_file(inname, depend_ptr) at asm/nasm.c:482. vulnerability in function assemble_file(inname, depend_ptr) at asm/nasm.c:482. that can result in aborting/crash nasm program. This attack appear to be exploitable via a specially crafted asm file..
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000667/">CVE-2018-1000667</cve>
	<bugzilla href="https://bugzilla.suse.com/1107592">SUSE bug 1107592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000876</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000877</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000877" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar-&gt;lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877</cve>
	<bugzilla href="https://bugzilla.suse.com/1120653">SUSE bug 1120653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603860" comment="bsdtar-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603861" comment="libarchive-devel-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603862" comment="libarchive13-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603863" comment="libarchive13-32bit-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000878</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000878" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878</cve>
	<bugzilla href="https://bugzilla.suse.com/1120654">SUSE bug 1120654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603860" comment="bsdtar-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603861" comment="libarchive-devel-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603862" comment="libarchive13-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603863" comment="libarchive13-32bit-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10016</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10016" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10016" ref_url="https://www.suse.com/security/cve/CVE-2018-10016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc0 has a division-by-zero vulnerability in the expr5 function in asm/eval.c via a malformed input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10016/">CVE-2018-10016</cve>
	<bugzilla href="https://bugzilla.suse.com/1089084">SUSE bug 1089084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181002105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1002105</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1002105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002105" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1002105" ref_url="https://www.suse.com/security/cve/CVE-2018-1002105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
    <description>
    In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1002105/">CVE-2018-1002105</cve>
	<bugzilla href="https://bugzilla.suse.com/1118198">SUSE bug 1118198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118260">SUSE bug 1118260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607614" comment="cri-o-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281964" comment="cri-o is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607615" comment="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281965" comment="cri-o-kubeadm-criconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607616" comment="cri-tools-1.18.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281966" comment="cri-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607617" comment="go1.14-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607618" comment="go1.14-doc-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607619" comment="go1.14-race-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607620" comment="kubernetes-apiserver-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281971" comment="kubernetes-apiserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607621" comment="kubernetes-client-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281972" comment="kubernetes-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607622" comment="kubernetes-controller-manager-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281973" comment="kubernetes-controller-manager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607623" comment="kubernetes-kubeadm-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281974" comment="kubernetes-kubeadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607624" comment="kubernetes-kubelet-common-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281975" comment="kubernetes-kubelet-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607625" comment="kubernetes-kubelet1.17-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281976" comment="kubernetes-kubelet1.17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607626" comment="kubernetes-kubelet1.18-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281977" comment="kubernetes-kubelet1.18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607627" comment="kubernetes-master-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281978" comment="kubernetes-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607628" comment="kubernetes-node-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281979" comment="kubernetes-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607629" comment="kubernetes-proxy-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281980" comment="kubernetes-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607630" comment="kubernetes-scheduler-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281981" comment="kubernetes-scheduler is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10103</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10103" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10105</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10105" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10196</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007668.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00073.html" source="SUSE-SU"/>
    <description>
    NULL pointer dereference vulnerability in the rebuild_vlists function in lib/dotgen/conc.c in the dotgen library in Graphviz 2.40.1 allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196</cve>
	<bugzilla href="https://bugzilla.suse.com/1093447">SUSE bug 1093447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605017" comment="graphviz-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167847" comment="graphviz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605018" comment="graphviz-devel-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167849" comment="graphviz-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605019" comment="graphviz-doc-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167851" comment="graphviz-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605020" comment="graphviz-gd-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167853" comment="graphviz-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605021" comment="graphviz-gnome-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167855" comment="graphviz-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605022" comment="graphviz-guile-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167857" comment="graphviz-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605023" comment="graphviz-gvedit-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167859" comment="graphviz-gvedit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605024" comment="graphviz-java-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167861" comment="graphviz-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605025" comment="graphviz-lua-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167863" comment="graphviz-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605026" comment="graphviz-perl-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167865" comment="graphviz-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605027" comment="graphviz-php-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167867" comment="graphviz-php is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605028" comment="graphviz-plugins-core-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254560" comment="graphviz-plugins-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605029" comment="graphviz-python-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167871" comment="graphviz-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605030" comment="graphviz-ruby-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167873" comment="graphviz-ruby is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605031" comment="graphviz-smyrna-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167875" comment="graphviz-smyrna is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605032" comment="graphviz-tcl-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167877" comment="graphviz-tcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605033" comment="libgraphviz6-2.40.1-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254561" comment="libgraphviz6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10254</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10254" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10254" ref_url="https://www.suse.com/security/cve/CVE-2018-10254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.13 has a stack-based buffer over-read in the disasm function of the disasm/disasm.c file. Remote attackers could leverage this vulnerability to cause a denial of service or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10254/">CVE-2018-10254</cve>
	<bugzilla href="https://bugzilla.suse.com/1090519">SUSE bug 1090519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10316</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10316" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10316" ref_url="https://www.suse.com/security/cve/CVE-2018-10316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc0 has an endless while loop in the assemble_file function of asm/nasm.c because of a globallineno integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10316/">CVE-2018-10316</cve>
	<bugzilla href="https://bugzilla.suse.com/1090840">SUSE bug 1090840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10536</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10536" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10536" ref_url="https://www.suse.com/security/cve/CVE-2018-10536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier. The WAV parser component contains a vulnerability that allows writing to memory because ParseRiffHeaderConfig in riff.c does not reject multiple format chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10536/">CVE-2018-10536</cve>
	<bugzilla href="https://bugzilla.suse.com/1091344">SUSE bug 1091344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10537</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10537" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10537" ref_url="https://www.suse.com/security/cve/CVE-2018-10537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10537/">CVE-2018-10537</cve>
	<bugzilla href="https://bugzilla.suse.com/1091343">SUSE bug 1091343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10538</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10538" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10538" ref_url="https://www.suse.com/security/cve/CVE-2018-10538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for WAV input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in riff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10538/">CVE-2018-10538</cve>
	<bugzilla href="https://bugzilla.suse.com/1091342">SUSE bug 1091342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10539</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10539" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10539" ref_url="https://www.suse.com/security/cve/CVE-2018-10539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10539/">CVE-2018-10539</cve>
	<bugzilla href="https://bugzilla.suse.com/1091341">SUSE bug 1091341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10540" ref_url="https://www.suse.com/security/cve/CVE-2018-10540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10540/">CVE-2018-10540</cve>
	<bugzilla href="https://bugzilla.suse.com/1091340">SUSE bug 1091340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1060</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2712-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1061</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2712-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method.  An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10811</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10811" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811</cve>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603817" comment="strongswan-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603818" comment="strongswan-doc-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603819" comment="strongswan-hmac-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153118" comment="strongswan-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603820" comment="strongswan-ipsec-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603821" comment="strongswan-libs0-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153120" comment="strongswan-libs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603822" comment="strongswan-mysql-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603823" comment="strongswan-nm-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603824" comment="strongswan-sqlite-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1088</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1088" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1088" ref_url="https://www.suse.com/security/cve/CVE-2018-1088" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1088/">CVE-2018-1088</cve>
	<bugzilla href="https://bugzilla.suse.com/1090084">SUSE bug 1090084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10886</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10886" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006840.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00055.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: this candidate is not about any specific product, protocol, or design, that falls into the scope of the assigning CNA. Notes: None.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886</cve>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608077" comment="ant-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151811" comment="ant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608078" comment="ant-antlr-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235582" comment="ant-antlr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608079" comment="ant-apache-bcel-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235583" comment="ant-apache-bcel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608080" comment="ant-apache-bsf-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235584" comment="ant-apache-bsf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608081" comment="ant-apache-log4j-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235585" comment="ant-apache-log4j is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608082" comment="ant-apache-oro-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235586" comment="ant-apache-oro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608083" comment="ant-apache-regexp-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235587" comment="ant-apache-regexp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608084" comment="ant-apache-resolver-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235588" comment="ant-apache-resolver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608085" comment="ant-apache-xalan2-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235589" comment="ant-apache-xalan2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608086" comment="ant-commons-logging-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235590" comment="ant-commons-logging is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608087" comment="ant-commons-net-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235591" comment="ant-commons-net is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608088" comment="ant-javamail-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235592" comment="ant-javamail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608089" comment="ant-jdepend-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235593" comment="ant-jdepend is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608090" comment="ant-jmf-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151812" comment="ant-jmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608091" comment="ant-jsch-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235594" comment="ant-jsch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608092" comment="ant-junit-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151813" comment="ant-junit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608093" comment="ant-manual-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235595" comment="ant-manual is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608094" comment="ant-scripts-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151814" comment="ant-scripts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608095" comment="ant-swing-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151815" comment="ant-swing is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608096" comment="ant-testutil-1.9.10-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235596" comment="ant-testutil is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10892</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10892" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10892" ref_url="https://www.suse.com/security/cve/CVE-2018-10892" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html" source="SUSE-SU"/>
    <description>
    The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10892/">CVE-2018-10892</cve>
	<bugzilla href="https://bugzilla.suse.com/1100331">SUSE bug 1100331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100838">SUSE bug 1100838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602528" comment="containerd-1.2.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602529" comment="containerd-ctr-1.2.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602530" comment="docker-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602531" comment="docker-bash-completion-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602532" comment="docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602533" comment="docker-runc-1.0.0rc8+gitr3826_425e105d5a03-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602534" comment="docker-test-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602535" comment="docker-zsh-completion-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602536" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10904</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10904" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10904" ref_url="https://www.suse.com/security/cve/CVE-2018-10904" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10904/">CVE-2018-10904</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107018">SUSE bug 1107018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10907</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10907" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10907" ref_url="https://www.suse.com/security/cve/CVE-2018-10907" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10907/">CVE-2018-10907</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107019">SUSE bug 1107019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10911</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10911" ref_url="https://www.suse.com/security/cve/CVE-2018-10911" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10911/">CVE-2018-10911</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107020">SUSE bug 1107020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10913</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10913" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10913" ref_url="https://www.suse.com/security/cve/CVE-2018-10913" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10913/">CVE-2018-10913</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107021">SUSE bug 1107021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10914</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10914" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10914" ref_url="https://www.suse.com/security/cve/CVE-2018-10914" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10914/">CVE-2018-10914</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107022">SUSE bug 1107022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10915</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604860" comment="libecpg6-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604861" comment="libpq5-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604862" comment="postgresql-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604863" comment="postgresql-contrib-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604864" comment="postgresql-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604865" comment="postgresql-docs-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604866" comment="postgresql-llvmjit-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604867" comment="postgresql-plperl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604868" comment="postgresql-plpython-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604869" comment="postgresql-pltcl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604870" comment="postgresql-server-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604871" comment="postgresql-server-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604872" comment="postgresql-test-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604873" comment="postgresql10-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604874" comment="postgresql10-contrib-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604875" comment="postgresql10-devel-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604876" comment="postgresql10-docs-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604877" comment="postgresql10-plperl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604878" comment="postgresql10-plpython-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604879" comment="postgresql10-pltcl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604880" comment="postgresql10-server-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604881" comment="postgresql10-test-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604882" comment="postgresql12-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604883" comment="postgresql12-contrib-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604884" comment="postgresql12-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604885" comment="postgresql12-docs-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604886" comment="postgresql12-llvmjit-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604887" comment="postgresql12-plperl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604888" comment="postgresql12-plpython-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604889" comment="postgresql12-pltcl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604890" comment="postgresql12-server-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604891" comment="postgresql12-server-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604892" comment="postgresql12-test-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604893" comment="postgresql96-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161265" comment="postgresql96 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604894" comment="postgresql96-contrib-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161266" comment="postgresql96-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604895" comment="postgresql96-devel-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161267" comment="postgresql96-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604896" comment="postgresql96-docs-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161268" comment="postgresql96-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604897" comment="postgresql96-plperl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163501" comment="postgresql96-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604898" comment="postgresql96-plpython-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163503" comment="postgresql96-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604899" comment="postgresql96-pltcl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163505" comment="postgresql96-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604900" comment="postgresql96-server-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161269" comment="postgresql96-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604901" comment="postgresql96-test-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163508" comment="postgresql96-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10923</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10923" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10923" ref_url="https://www.suse.com/security/cve/CVE-2018-10923" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10923/">CVE-2018-10923</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107023">SUSE bug 1107023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10924</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10924" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10924" ref_url="https://www.suse.com/security/cve/CVE-2018-10924" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10924/">CVE-2018-10924</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107024">SUSE bug 1107024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10925</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925</cve>
	<bugzilla href="https://bugzilla.suse.com/1104202">SUSE bug 1104202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604860" comment="libecpg6-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604861" comment="libpq5-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604862" comment="postgresql-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604863" comment="postgresql-contrib-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604864" comment="postgresql-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604865" comment="postgresql-docs-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604866" comment="postgresql-llvmjit-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604867" comment="postgresql-plperl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604868" comment="postgresql-plpython-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604869" comment="postgresql-pltcl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604870" comment="postgresql-server-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604871" comment="postgresql-server-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604872" comment="postgresql-test-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604873" comment="postgresql10-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604874" comment="postgresql10-contrib-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604875" comment="postgresql10-devel-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604876" comment="postgresql10-docs-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604877" comment="postgresql10-plperl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604878" comment="postgresql10-plpython-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604879" comment="postgresql10-pltcl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604880" comment="postgresql10-server-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604881" comment="postgresql10-test-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604882" comment="postgresql12-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604883" comment="postgresql12-contrib-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604884" comment="postgresql12-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604885" comment="postgresql12-docs-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604886" comment="postgresql12-llvmjit-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604887" comment="postgresql12-plperl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604888" comment="postgresql12-plpython-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604889" comment="postgresql12-pltcl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604890" comment="postgresql12-server-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604891" comment="postgresql12-server-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604892" comment="postgresql12-test-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604893" comment="postgresql96-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161265" comment="postgresql96 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604894" comment="postgresql96-contrib-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161266" comment="postgresql96-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604895" comment="postgresql96-devel-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161267" comment="postgresql96-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604896" comment="postgresql96-docs-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161268" comment="postgresql96-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604897" comment="postgresql96-plperl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163501" comment="postgresql96-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604898" comment="postgresql96-plpython-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163503" comment="postgresql96-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604899" comment="postgresql96-pltcl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163505" comment="postgresql96-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604900" comment="postgresql96-server-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161269" comment="postgresql96-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604901" comment="postgresql96-test-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163508" comment="postgresql96-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10926</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10926" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10926" ref_url="https://www.suse.com/security/cve/CVE-2018-10926" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10926/">CVE-2018-10926</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107025">SUSE bug 1107025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112909">SUSE bug 1112909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10927</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10927" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10927" ref_url="https://www.suse.com/security/cve/CVE-2018-10927" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10927/">CVE-2018-10927</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107026">SUSE bug 1107026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112909">SUSE bug 1112909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10928</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10928" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10928" ref_url="https://www.suse.com/security/cve/CVE-2018-10928" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10928/">CVE-2018-10928</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107027">SUSE bug 1107027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112909">SUSE bug 1112909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10929</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10929" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10929" ref_url="https://www.suse.com/security/cve/CVE-2018-10929" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10929/">CVE-2018-10929</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107028">SUSE bug 1107028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112909">SUSE bug 1112909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10930</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10930" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10930" ref_url="https://www.suse.com/security/cve/CVE-2018-10930" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10930/">CVE-2018-10930</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107029">SUSE bug 1107029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112909">SUSE bug 1112909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1112</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1112" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1112" ref_url="https://www.suse.com/security/cve/CVE-2018-1112" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" source="SUSE-SU"/>
    <description>
    glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1112/">CVE-2018-1112</cve>
	<bugzilla href="https://bugzilla.suse.com/1090084">SUSE bug 1090084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608432" comment="glusterfs-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276150" comment="glusterfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608433" comment="glusterfs-devel-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276151" comment="glusterfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608434" comment="libgfapi0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276152" comment="libgfapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608435" comment="libgfchangelog0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276153" comment="libgfchangelog0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608436" comment="libgfdb0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276154" comment="libgfdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608437" comment="libgfrpc0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276155" comment="libgfrpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608438" comment="libgfxdr0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276156" comment="libgfxdr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608439" comment="libglusterfs0-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276157" comment="libglusterfs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608440" comment="python-gluster-3.12.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276158" comment="python-gluster is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1115</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1115" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1115" ref_url="https://www.suse.com/security/cve/CVE-2018-1115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1900-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1115/">CVE-2018-1115</cve>
	<bugzilla href="https://bugzilla.suse.com/1091610">SUSE bug 1091610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604860" comment="libecpg6-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604861" comment="libpq5-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604862" comment="postgresql-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604863" comment="postgresql-contrib-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604864" comment="postgresql-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604865" comment="postgresql-docs-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604866" comment="postgresql-llvmjit-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604867" comment="postgresql-plperl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604868" comment="postgresql-plpython-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604869" comment="postgresql-pltcl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604870" comment="postgresql-server-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604871" comment="postgresql-server-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604872" comment="postgresql-test-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604873" comment="postgresql10-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604874" comment="postgresql10-contrib-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604875" comment="postgresql10-devel-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604876" comment="postgresql10-docs-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604877" comment="postgresql10-plperl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604878" comment="postgresql10-plpython-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604879" comment="postgresql10-pltcl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604880" comment="postgresql10-server-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604881" comment="postgresql10-test-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604882" comment="postgresql12-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604883" comment="postgresql12-contrib-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604884" comment="postgresql12-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604885" comment="postgresql12-docs-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604886" comment="postgresql12-llvmjit-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604887" comment="postgresql12-plperl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604888" comment="postgresql12-plpython-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604889" comment="postgresql12-pltcl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604890" comment="postgresql12-server-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604891" comment="postgresql12-server-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604892" comment="postgresql12-test-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604893" comment="postgresql96-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161265" comment="postgresql96 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604894" comment="postgresql96-contrib-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161266" comment="postgresql96-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604895" comment="postgresql96-devel-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161267" comment="postgresql96-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604896" comment="postgresql96-docs-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161268" comment="postgresql96-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604897" comment="postgresql96-plperl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163501" comment="postgresql96-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604898" comment="postgresql96-plpython-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163503" comment="postgresql96-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604899" comment="postgresql96-pltcl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163505" comment="postgresql96-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604900" comment="postgresql96-server-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161269" comment="postgresql96-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604901" comment="postgresql96-test-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163508" comment="postgresql96-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1122</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603360" comment="libprocps7-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268885" comment="libprocps7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603361" comment="procps-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229657" comment="procps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603362" comment="procps-devel-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229658" comment="procps-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1123</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603360" comment="libprocps7-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268885" comment="libprocps7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603361" comment="procps-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229657" comment="procps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603362" comment="procps-devel-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229658" comment="procps-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11233</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233</cve>
	<bugzilla href="https://bugzilla.suse.com/1095218">SUSE bug 1095218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11235</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1124</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603360" comment="libprocps7-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268885" comment="libprocps7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603361" comment="procps-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229657" comment="procps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603362" comment="procps-devel-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229658" comment="procps-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11243</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11243" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11243" ref_url="https://www.suse.com/security/cve/CVE-2018-11243" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0163-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html" source="SUSE-SU"/>
    <description>
    PackLinuxElf64::unpack in p_lx_elf.cpp in UPX 3.95 allows remote attackers to cause a denial of service (double free), limit the ability of a malware scanner to operate on the entire original data, or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11243/">CVE-2018-11243</cve>
	<bugzilla href="https://bugzilla.suse.com/1094138">SUSE bug 1094138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605497" comment="libucl1-1.03-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277404" comment="libucl1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605498" comment="ucl-devel-1.03-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277406" comment="ucl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605500" comment="upx-3.96-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165780" comment="upx is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1125</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603360" comment="libprocps7-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268885" comment="libprocps7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603361" comment="procps-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229657" comment="procps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603362" comment="procps-devel-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229658" comment="procps-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1126</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603360" comment="libprocps7-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268885" comment="libprocps7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603361" comment="procps-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229657" comment="procps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603362" comment="procps-devel-3.3.15-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229658" comment="procps-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11354</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11354" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11355</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11355" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11356</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11357</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11358</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11359</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the RRC dissector and other dissectors could crash. This was addressed in epan/proto.c by avoiding a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11360</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash. This was addressed in epan/dissectors/packet-gsm_a_dtap.c by fixing an off-by-one error that caused a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11361</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11361" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/dot11decrypt.c by avoiding a buffer overflow during FTE processing in Dot11DecryptTDLSDeriveKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11362</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11396</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11396" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11396" ref_url="https://www.suse.com/security/cve/CVE-2018-11396" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00043.html" source="SUSE-SU"/>
    <description>
    ephy-session.c in libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via JavaScript code that triggers access to a NULL URL, as demonstrated by a crafted window.open call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11396/">CVE-2018-11396</cve>
	<bugzilla href="https://bugzilla.suse.com/1094464">SUSE bug 1094464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096688">SUSE bug 1096688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603311" comment="epiphany-3.28.1.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268135" comment="epiphany is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603312" comment="epiphany-branding-upstream-3.28.1.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268137" comment="epiphany-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603313" comment="epiphany-lang-3.28.1.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268139" comment="epiphany-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603314" comment="gnome-shell-search-provider-epiphany-3.28.1.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268141" comment="gnome-shell-search-provider-epiphany is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11499</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11499" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11499" ref_url="https://www.suse.com/security/cve/CVE-2018-11499" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability exists in handle_error() in sass_context.cpp in LibSass 3.4.x and 3.5.x through 3.5.4 that could be leveraged to cause a denial of service (application crash) or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11499/">CVE-2018-11499</cve>
	<bugzilla href="https://bugzilla.suse.com/1096894">SUSE bug 1096894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11763</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11763" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3582-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763</cve>
	<bugzilla href="https://bugzilla.suse.com/1109961">SUSE bug 1109961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11782</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11782" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11782" ref_url="https://www.suse.com/security/cve/CVE-2018-11782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00051.html" source="SUSE-SU"/>
    <description>
    In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11782/">CVE-2018-11782</cve>
	<bugzilla href="https://bugzilla.suse.com/1142743">SUSE bug 1142743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602090" comment="libsvn_auth_gnome_keyring-1-0-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152695" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602091" comment="libsvn_auth_kwallet-1-0-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152696" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602092" comment="subversion-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602093" comment="subversion-bash-completion-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152697" comment="subversion-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602094" comment="subversion-devel-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602095" comment="subversion-perl-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602096" comment="subversion-python-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602097" comment="subversion-python-ctypes-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154271" comment="subversion-python-ctypes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602098" comment="subversion-ruby-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152698" comment="subversion-ruby is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602099" comment="subversion-server-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602100" comment="subversion-tools-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11784</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3968-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183968-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784</cve>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11805</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11805" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00003.html" source="SUSE-SU"/>
    <description>
    In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf files from trusted places.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805</cve>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607338" comment="perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261407" comment="perl-Mail-SpamAssassin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607339" comment="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261408" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607340" comment="spamassassin-3.4.2-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261409" comment="spamassassin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12086</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12086" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12126</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135524">SUSE bug 1135524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149729">SUSE bug 1149729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601989" comment="ucode-intel-20190618-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609646" comment="xen-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609647" comment="xen-devel-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609648" comment="xen-doc-html-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609649" comment="xen-libs-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609650" comment="xen-libs-32bit-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609651" comment="xen-tools-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609652" comment="xen-tools-domU-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12127</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601989" comment="ucode-intel-20190618-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609646" comment="xen-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609647" comment="xen-devel-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609648" comment="xen-doc-html-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609649" comment="xen-libs-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609650" comment="xen-libs-32bit-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609651" comment="xen-tools-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609652" comment="xen-tools-domU-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12130</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601989" comment="ucode-intel-20190618-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609646" comment="xen-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609647" comment="xen-devel-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609648" comment="xen-doc-html-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609649" comment="xen-libs-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609650" comment="xen-libs-32bit-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609651" comment="xen-tools-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609652" comment="xen-tools-domU-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12207</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="TID000019411" ref_url="https://www.suse.com/support/kb/doc/?id=000019411" source="SUSE-SU"/>
		<reference ref_id="TID7023735" ref_url="https://www.suse.com/support/kb/doc/?id=7023735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html" source="SUSE-SU"/>
    <description>
    Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155812">SUSE bug 1155812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155817">SUSE bug 1155817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603643" comment="kernel-debug-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603644" comment="kernel-debug-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603645" comment="kernel-debug-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603646" comment="kernel-default-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603647" comment="kernel-default-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603648" comment="kernel-default-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603649" comment="kernel-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603650" comment="kernel-docs-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603651" comment="kernel-docs-html-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603652" comment="kernel-kvmsmall-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603653" comment="kernel-kvmsmall-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603654" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603655" comment="kernel-macros-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603656" comment="kernel-obs-build-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603657" comment="kernel-obs-qa-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603658" comment="kernel-source-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603659" comment="kernel-source-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603660" comment="kernel-syms-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603661" comment="kernel-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603662" comment="kernel-vanilla-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603663" comment="kernel-vanilla-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603672" comment="qemu-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603673" comment="qemu-arm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603674" comment="qemu-audio-alsa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603675" comment="qemu-audio-oss-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603676" comment="qemu-audio-pa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603677" comment="qemu-audio-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603678" comment="qemu-block-curl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603679" comment="qemu-block-dmg-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603680" comment="qemu-block-gluster-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603681" comment="qemu-block-iscsi-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603682" comment="qemu-block-nfs-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603683" comment="qemu-block-rbd-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603684" comment="qemu-block-ssh-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603685" comment="qemu-extra-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603686" comment="qemu-guest-agent-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603687" comment="qemu-ipxe-1.0.0+-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603688" comment="qemu-ksm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603689" comment="qemu-kvm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603690" comment="qemu-lang-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603691" comment="qemu-linux-user-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603692" comment="qemu-ppc-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603693" comment="qemu-s390-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603694" comment="qemu-seabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603695" comment="qemu-sgabios-8-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603696" comment="qemu-tools-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603697" comment="qemu-ui-curses-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603698" comment="qemu-ui-gtk-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603699" comment="qemu-ui-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603700" comment="qemu-vgabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603701" comment="qemu-x86-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604342" comment="spectre-meltdown-checker-0.43-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275301" comment="spectre-meltdown-checker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603664" comment="xen-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603665" comment="xen-devel-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603666" comment="xen-doc-html-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603667" comment="xen-libs-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603668" comment="xen-libs-32bit-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603669" comment="xen-tools-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603670" comment="xen-tools-domU-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12264</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12264" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12264" ref_url="https://www.suse.com/security/cve/CVE-2018-12264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Exiv2 0.26 has integer overflows in LoaderTiff::getData() in preview.cpp, leading to an out-of-bounds read in Exiv2::ValueType::setDataArea in value.hpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12264/">CVE-2018-12264</cve>
	<bugzilla href="https://bugzilla.suse.com/1097600">SUSE bug 1097600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12265</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12265" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12265" ref_url="https://www.suse.com/security/cve/CVE-2018-12265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12265/">CVE-2018-12265</cve>
	<bugzilla href="https://bugzilla.suse.com/1097599">SUSE bug 1097599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12648</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12648" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12648" ref_url="https://www.suse.com/security/cve/CVE-2018-12648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005607.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1657-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00070.html" source="SUSE-SU"/>
    <description>
    The WEBP::GetLE32 function in XMPFiles/source/FormatSupport/WEBP_Support.hpp in Exempi 2.4.5 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12648/">CVE-2018-12648</cve>
	<bugzilla href="https://bugzilla.suse.com/1098946">SUSE bug 1098946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601631" comment="exempi-tools-2.4.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173302" comment="exempi-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601632" comment="libexempi-devel-2.4.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173303" comment="libexempi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601633" comment="libexempi3-2.4.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173304" comment="libexempi3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601634" comment="libexempi3-32bit-2.4.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173305" comment="libexempi3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13305</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13305" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13305" ref_url="https://www.suse.com/security/cve/CVE-2018-13305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00012.html" source="SUSE-SU"/>
    <description>
    In FFmpeg 4.0.1, due to a missing check for negative values of the mquant variable, the vc1_put_blocks_clamped function in libavcodec/vc1_block.c may trigger an out-of-array access while converting a crafted AVI file to MPEG4, leading to an information disclosure or a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13305/">CVE-2018-13305</cve>
	<bugzilla href="https://bugzilla.suse.com/1100345">SUSE bug 1100345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609618" comment="ffmpeg-4-libavcodec-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234594" comment="ffmpeg-4-libavcodec-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609619" comment="ffmpeg-4-libavdevice-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234595" comment="ffmpeg-4-libavdevice-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609620" comment="ffmpeg-4-libavfilter-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234596" comment="ffmpeg-4-libavfilter-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609621" comment="ffmpeg-4-libavformat-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234597" comment="ffmpeg-4-libavformat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609622" comment="ffmpeg-4-libavresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234598" comment="ffmpeg-4-libavresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609623" comment="ffmpeg-4-libavutil-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234599" comment="ffmpeg-4-libavutil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609624" comment="ffmpeg-4-libpostproc-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234600" comment="ffmpeg-4-libpostproc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609625" comment="ffmpeg-4-libswresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234601" comment="ffmpeg-4-libswresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609626" comment="ffmpeg-4-libswscale-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234602" comment="ffmpeg-4-libswscale-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609627" comment="ffmpeg-4-private-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234603" comment="ffmpeg-4-private-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609628" comment="libavcodec58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234604" comment="libavcodec58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510674" comment="libavcodec58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234605" comment="libavcodec58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609629" comment="libavdevice58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234606" comment="libavdevice58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510677" comment="libavdevice58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234607" comment="libavdevice58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609630" comment="libavfilter7-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234608" comment="libavfilter7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510680" comment="libavfilter7-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234609" comment="libavfilter7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609631" comment="libavformat58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234610" comment="libavformat58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510683" comment="libavformat58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234611" comment="libavformat58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609632" comment="libavresample4-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234612" comment="libavresample4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510686" comment="libavresample4-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234613" comment="libavresample4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609633" comment="libavutil56-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234614" comment="libavutil56 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510689" comment="libavutil56-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234615" comment="libavutil56-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609634" comment="libpostproc55-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234616" comment="libpostproc55 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510692" comment="libpostproc55-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234617" comment="libpostproc55-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609635" comment="libswresample3-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234618" comment="libswresample3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510695" comment="libswresample3-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234619" comment="libswresample3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609636" comment="libswscale5-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234620" comment="libswscale5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510698" comment="libswscale5-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234621" comment="libswscale5-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13441</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13441" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13441" ref_url="https://www.suse.com/security/cve/CVE-2018-13441" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html" source="SUSE-SU"/>
    <description>
    qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-13441/">CVE-2018-13441</cve>
	<bugzilla href="https://bugzilla.suse.com/1101293">SUSE bug 1101293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607477" comment="nagios-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151576" comment="nagios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607478" comment="nagios-contrib-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281477" comment="nagios-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607479" comment="nagios-devel-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281478" comment="nagios-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607480" comment="nagios-theme-exfoliation-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281479" comment="nagios-theme-exfoliation is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607481" comment="nagios-www-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151577" comment="nagios-www is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607482" comment="nagios-www-dch-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281480" comment="nagios-www-dch is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13457</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13457" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13457" ref_url="https://www.suse.com/security/cve/CVE-2018-13457" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html" source="SUSE-SU"/>
    <description>
    qh_echo in Nagios Core 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attackers to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-13457/">CVE-2018-13457</cve>
	<bugzilla href="https://bugzilla.suse.com/1101290">SUSE bug 1101290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607477" comment="nagios-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151576" comment="nagios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607478" comment="nagios-contrib-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281477" comment="nagios-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607479" comment="nagios-devel-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281478" comment="nagios-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607480" comment="nagios-theme-exfoliation-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281479" comment="nagios-theme-exfoliation is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607481" comment="nagios-www-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151577" comment="nagios-www is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607482" comment="nagios-www-dch-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281480" comment="nagios-www-dch is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13458</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13458" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13458" ref_url="https://www.suse.com/security/cve/CVE-2018-13458" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html" source="SUSE-SU"/>
    <description>
    qh_core in Nagios Core 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attackers to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-13458/">CVE-2018-13458</cve>
	<bugzilla href="https://bugzilla.suse.com/1101289">SUSE bug 1101289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607477" comment="nagios-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151576" comment="nagios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607478" comment="nagios-contrib-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281477" comment="nagios-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607479" comment="nagios-devel-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281478" comment="nagios-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607480" comment="nagios-theme-exfoliation-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281479" comment="nagios-theme-exfoliation is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607481" comment="nagios-www-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151577" comment="nagios-www is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607482" comment="nagios-www-dch-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281480" comment="nagios-www-dch is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13785</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00021.html" source="SUSE-SU"/>
    <description>
    In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<bugzilla href="https://bugzilla.suse.com/1100687">SUSE bug 1100687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601411" comment="libpng16-16-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601412" comment="libpng16-16-32bit-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601413" comment="libpng16-compat-devel-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601414" comment="libpng16-compat-devel-32bit-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153135" comment="libpng16-compat-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601415" comment="libpng16-devel-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601416" comment="libpng16-devel-32bit-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153136" comment="libpng16-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601417" comment="libpng16-tools-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14332</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14332" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14332" ref_url="https://www.suse.com/security/cve/CVE-2018-14332" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1959-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00064.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Clementine Music Player 1.3.1. Clementine.exe is vulnerable to a user mode write access violation due to a NULL pointer dereference in the Init call in the MoodbarPipeline::NewPadCallback function in moodbar/moodbarpipeline.cpp. The vulnerability is triggered when the user opens a malformed mp3 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-14332/">CVE-2018-14332</cve>
	<bugzilla href="https://bugzilla.suse.com/1103041">SUSE bug 1103041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609653" comment="clementine-1.3.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260298" comment="clementine is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14339</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14339" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14340</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14340" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14341</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14341" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14342</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14342" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14343</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14343" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14344</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14344" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ISMP dissector could crash. This was addressed in epan/dissectors/packet-ismp.c by validating the IPX address length to avoid a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14367</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14367" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14368</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14368" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14369</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14369" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14370</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14370" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14461</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14461" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14462</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14462" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14463</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14463" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14464</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14464" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14465</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14465" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14466</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14466" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166972">SUSE bug 1166972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14467</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14467" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14468</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14468" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14469</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14469" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14470</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14470" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14470" ref_url="https://www.suse.com/security/cve/CVE-2018-14470" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14470/">CVE-2018-14470</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14526</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14553</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0594-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006588.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html" source="SUSE-SU"/>
    <description>
    gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553</cve>
	<bugzilla href="https://bugzilla.suse.com/1165471">SUSE bug 1165471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607038" comment="gd-2.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607039" comment="gd-devel-2.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607040" comment="libgd3-2.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177199" comment="libgd3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607041" comment="libgd3-32bit-2.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235644" comment="libgd3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14647</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14879</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14879" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14879" ref_url="https://www.suse.com/security/cve/CVE-2018-14879" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14879/">CVE-2018-14879</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14880</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14880" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14880" ref_url="https://www.suse.com/security/cve/CVE-2018-14880" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14880/">CVE-2018-14880</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14881</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14881" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14882</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14882" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15173</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15173" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2425-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005949.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1462-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2198-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html" source="SUSE-SU"/>
    <description>
    Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173</cve>
	<bugzilla href="https://bugzilla.suse.com/1104139">SUSE bug 1104139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603033" comment="ncat-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253372" comment="ncat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603034" comment="ndiff-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253373" comment="ndiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603035" comment="nmap-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253374" comment="nmap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603036" comment="nping-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253375" comment="nping is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603037" comment="zenmap-7.70-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253376" comment="zenmap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15518</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15518" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption during parsing of a specially crafted illegal XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605258" comment="libqt4-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605259" comment="libqt4-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605260" comment="libqt4-devel-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605261" comment="libqt4-devel-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230219" comment="libqt4-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605262" comment="libqt4-devel-doc-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230220" comment="libqt4-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605263" comment="libqt4-devel-doc-data-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230221" comment="libqt4-devel-doc-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605264" comment="libqt4-linguist-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605265" comment="libqt4-private-headers-devel-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230222" comment="libqt4-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605266" comment="libqt4-qt3support-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605267" comment="libqt4-qt3support-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605268" comment="libqt4-sql-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605269" comment="libqt4-sql-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605270" comment="libqt4-sql-postgresql-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605271" comment="libqt4-sql-sqlite-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605272" comment="libqt4-sql-sqlite-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605273" comment="libqt4-sql-unixODBC-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605274" comment="libqt4-x11-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605275" comment="libqt4-x11-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605276" comment="qt4-x11-tools-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230226" comment="qt4-x11-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15587</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15587" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1266-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1391-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00024.html" source="SUSE-SU"/>
    <description>
    GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587</cve>
	<bugzilla href="https://bugzilla.suse.com/1125230">SUSE bug 1125230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601267" comment="evolution-3.26.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254401" comment="evolution is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601268" comment="evolution-devel-3.26.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254402" comment="evolution-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601269" comment="evolution-lang-3.26.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254403" comment="evolution-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601270" comment="evolution-plugin-bogofilter-3.26.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254404" comment="evolution-plugin-bogofilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601271" comment="evolution-plugin-pst-import-3.26.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254405" comment="evolution-plugin-pst-import is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601272" comment="evolution-plugin-spamassassin-3.26.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254406" comment="evolution-plugin-spamassassin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601273" comment="glade-catalog-evolution-3.26.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254407" comment="glade-catalog-evolution is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15664</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15664" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005844.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html" source="SUSE-SU"/>
    <description>
    In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664</cve>
	<bugzilla href="https://bugzilla.suse.com/1096726">SUSE bug 1096726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139649">SUSE bug 1139649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601623" comment="docker-18.09.6_ce-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601624" comment="docker-bash-completion-18.09.6_ce-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601625" comment="docker-test-18.09.6_ce-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601626" comment="docker-zsh-completion-18.09.6_ce-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602574" comment="fuse-overlayfs-0.4.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266785" comment="fuse-overlayfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602575" comment="fuse3-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266786" comment="fuse3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602576" comment="fuse3-devel-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266787" comment="fuse3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602577" comment="fuse3-doc-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266788" comment="fuse3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602578" comment="libcontainers-common-20190401-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266789" comment="libcontainers-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602579" comment="libfuse3-3-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266790" comment="libfuse3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602580" comment="podman-1.4.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602581" comment="podman-cni-config-1.4.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602582" comment="slirp4netns-0.3.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266793" comment="slirp4netns is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15750</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15750" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604403" comment="python2-salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604404" comment="python3-salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604405" comment="salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604406" comment="salt-api-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604407" comment="salt-bash-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604408" comment="salt-cloud-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604409" comment="salt-doc-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604410" comment="salt-fish-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604411" comment="salt-master-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604412" comment="salt-minion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604413" comment="salt-proxy-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604414" comment="salt-ssh-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604415" comment="salt-standalone-formulas-configuration-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604416" comment="salt-syndic-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604417" comment="salt-zsh-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15751" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-30"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113699">SUSE bug 1113699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604403" comment="python2-salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604404" comment="python3-salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604405" comment="salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604406" comment="salt-api-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604407" comment="salt-bash-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604408" comment="salt-cloud-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604409" comment="salt-doc-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604410" comment="salt-fish-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604411" comment="salt-master-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604412" comment="salt-minion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604413" comment="salt-proxy-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604414" comment="salt-ssh-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604415" comment="salt-standalone-formulas-configuration-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604416" comment="salt-syndic-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604417" comment="salt-zsh-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16056</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth Attribute Protocol dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by verifying that a dissector for a specific UUID exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16057</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16058</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth AVDTP dissector could crash. This was addressed in epan/dissectors/packet-btavdtp.c by properly initializing a data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16062</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16140</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16140" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16140" ref_url="https://www.suse.com/security/cve/CVE-2018-16140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00064.html" source="SUSE-SU"/>
    <description>
    A buffer underwrite vulnerability in get_line() (read.c) in fig2dev 3.2.7a allows an attacker to write prior to the beginning of the buffer via a crafted .fig file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16140/">CVE-2018-16140</cve>
	<bugzilla href="https://bugzilla.suse.com/1106531">SUSE bug 1106531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601332" comment="transfig-3.2.6a-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16151</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16151" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603817" comment="strongswan-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603818" comment="strongswan-doc-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603819" comment="strongswan-hmac-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153118" comment="strongswan-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603820" comment="strongswan-ipsec-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603821" comment="strongswan-libs0-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153120" comment="strongswan-libs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603822" comment="strongswan-mysql-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603823" comment="strongswan-nm-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603824" comment="strongswan-sqlite-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16152</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16152" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603817" comment="strongswan-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603818" comment="strongswan-doc-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603819" comment="strongswan-hmac-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153118" comment="strongswan-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603820" comment="strongswan-ipsec-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603821" comment="strongswan-libs0-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153120" comment="strongswan-libs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603822" comment="strongswan-mysql-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603823" comment="strongswan-nm-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603824" comment="strongswan-sqlite-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16227</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16227" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16227" ref_url="https://www.suse.com/security/cve/CVE-2018-16227" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16227/">CVE-2018-16227</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16228</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16228" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16228" ref_url="https://www.suse.com/security/cve/CVE-2018-16228" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16228/">CVE-2018-16228</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16229</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16229" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16230</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16230" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16300</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16300" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16301</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16301" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7F42RBJPTM53DGGULUXWD56J42LIIEII/" source="SUSE-SU"/>
    <description>
    The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603321" comment="libpcap-devel-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603322" comment="libpcap-devel-32bit-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603323" comment="libpcap-devel-static-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603324" comment="libpcap1-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603325" comment="libpcap1-32bit-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16382</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16382" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16382" ref_url="https://www.suse.com/security/cve/CVE-2018-16382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc15 has a buffer over-read in x86/regflags.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-16382/">CVE-2018-16382</cve>
	<bugzilla href="https://bugzilla.suse.com/1106878">SUSE bug 1106878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16395</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16395" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395</cve>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16396</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16396" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396</cve>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16402</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16402" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16402" ref_url="https://www.suse.com/security/cve/CVE-2018-16402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16402/">CVE-2018-16402</cve>
	<bugzilla href="https://bugzilla.suse.com/1107066">SUSE bug 1107066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16403</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16451</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16451" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16452</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16452" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16471</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16471" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006468.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" source="SUSE-SU"/>
    <description>
    There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471</cve>
	<bugzilla href="https://bugzilla.suse.com/1114828">SUSE bug 1114828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116600">SUSE bug 1116600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122178">SUSE bug 1122178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606622" comment="ruby2.5-rubygem-rack-2.0.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278437" comment="ruby2.5-rubygem-rack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606623" comment="ruby2.5-rubygem-rack-doc-2.0.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278438" comment="ruby2.5-rubygem-rack-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606624" comment="ruby2.5-rubygem-rack-testsuite-2.0.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278439" comment="ruby2.5-rubygem-rack-testsuite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16517" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16517" ref_url="https://www.suse.com/security/cve/CVE-2018-16517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    asm/labels.c in Netwide Assembler (NASM) is prone to NULL Pointer Dereference, which allows the attacker to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16517/">CVE-2018-16517</cve>
	<bugzilla href="https://bugzilla.suse.com/1107594">SUSE bug 1107594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16548</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16548" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16548" ref_url="https://www.suse.com/security/cve/CVE-2018-16548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006273.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00065.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak triggered in the function __zzip_parse_root_directory in zip.c, which will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16548/">CVE-2018-16548</cve>
	<bugzilla href="https://bugzilla.suse.com/1107424">SUSE bug 1107424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603384" comment="libzzip-0-13-0.13.69-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155239" comment="libzzip-0-13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603385" comment="libzzip-0-13-32bit-0.13.69-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155241" comment="libzzip-0-13-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603386" comment="zziplib-devel-0.13.69-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251928" comment="zziplib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603387" comment="zziplib-devel-32bit-0.13.69-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251929" comment="zziplib-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16837</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16837" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
    <description>
    Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837</cve>
	<bugzilla href="https://bugzilla.suse.com/1112959">SUSE bug 1112959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609654" comment="ansible-2.8.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16838</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16838" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1576-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00051.html" source="SUSE-SU"/>
    <description>
    A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838</cve>
	<bugzilla href="https://bugzilla.suse.com/1124194">SUSE bug 1124194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601535" comment="libipa_hbac-devel-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152068" comment="libipa_hbac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601536" comment="libipa_hbac0-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152069" comment="libipa_hbac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601537" comment="libnfsidmap-sss-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231788" comment="libnfsidmap-sss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601538" comment="libsss_certmap-devel-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231789" comment="libsss_certmap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601539" comment="libsss_certmap0-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231790" comment="libsss_certmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601540" comment="libsss_idmap-devel-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152070" comment="libsss_idmap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601541" comment="libsss_idmap0-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601542" comment="libsss_nss_idmap-devel-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152071" comment="libsss_nss_idmap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601543" comment="libsss_nss_idmap0-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152072" comment="libsss_nss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601544" comment="libsss_simpleifp-devel-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231791" comment="libsss_simpleifp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601545" comment="libsss_simpleifp0-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231792" comment="libsss_simpleifp0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601546" comment="python3-ipa_hbac-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231793" comment="python3-ipa_hbac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601547" comment="python3-sss-murmur-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231794" comment="python3-sss-murmur is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601548" comment="python3-sss_nss_idmap-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231795" comment="python3-sss_nss_idmap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601549" comment="python3-sssd-config-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231796" comment="python3-sssd-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601550" comment="sssd-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601551" comment="sssd-32bit-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151532" comment="sssd-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601552" comment="sssd-ad-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152077" comment="sssd-ad is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601553" comment="sssd-dbus-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231797" comment="sssd-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601554" comment="sssd-ipa-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152078" comment="sssd-ipa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601555" comment="sssd-krb5-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152079" comment="sssd-krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601556" comment="sssd-krb5-common-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601557" comment="sssd-ldap-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601558" comment="sssd-proxy-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152080" comment="sssd-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601559" comment="sssd-tools-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152081" comment="sssd-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601560" comment="sssd-wbclient-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231798" comment="sssd-wbclient is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601561" comment="sssd-wbclient-devel-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231799" comment="sssd-wbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601562" comment="sssd-winbind-idmap-1.16.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231800" comment="sssd-winbind-idmap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16843</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16843" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16843" ref_url="https://www.suse.com/security/cve/CVE-2018-16843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" source="SUSE-SU"/>
    <description>
    nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16843/">CVE-2018-16843</cve>
	<bugzilla href="https://bugzilla.suse.com/1115022">SUSE bug 1115022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115025">SUSE bug 1115025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602679" comment="nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602680" comment="nginx-source-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266795" comment="nginx-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602681" comment="vim-plugin-nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173966" comment="vim-plugin-nginx is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16844</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16844" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16844" ref_url="https://www.suse.com/security/cve/CVE-2018-16844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" source="SUSE-SU"/>
    <description>
    nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16844/">CVE-2018-16844</cve>
	<bugzilla href="https://bugzilla.suse.com/1115022">SUSE bug 1115022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115025">SUSE bug 1115025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602679" comment="nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602680" comment="nginx-source-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266795" comment="nginx-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602681" comment="vim-plugin-nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173966" comment="vim-plugin-nginx is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16845</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16845" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16845" ref_url="https://www.suse.com/security/cve/CVE-2018-16845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" source="SUSE-SU"/>
    <description>
    nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16845/">CVE-2018-16845</cve>
	<bugzilla href="https://bugzilla.suse.com/1115015">SUSE bug 1115015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602679" comment="nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602680" comment="nginx-source-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266795" comment="nginx-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602681" comment="vim-plugin-nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173966" comment="vim-plugin-nginx is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16858</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16858" ref_url="https://www.suse.com/security/cve/CVE-2018-16858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1448-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191448-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2003-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192003-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00059.html" source="SUSE-SU"/>
    <description>
    It was found that libreoffice before versions 6.0.7 and 6.1.3 was vulnerable to a directory traversal attack which could be used to execute arbitrary macros bundled with a document. An attacker could craft a document, which when opened by LibreOffice, would execute a Python method from a script in any arbitrary file system location, specified relative to the LibreOffice install location.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16858/">CVE-2018-16858</cve>
	<bugzilla href="https://bugzilla.suse.com/1124062">SUSE bug 1124062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146107">SUSE bug 1146107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602165" comment="libixion-0_14-0-0.14.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262159" comment="libixion-0_14-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602166" comment="libixion-devel-0.14.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153322" comment="libixion-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602167" comment="libixion-tools-0.14.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153324" comment="libixion-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602168" comment="liborcus-0_14-0-0.14.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262164" comment="liborcus-0_14-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602169" comment="liborcus-devel-0.14.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153327" comment="liborcus-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602170" comment="liborcus-tools-0.14.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153329" comment="liborcus-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602171" comment="libreoffice-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602172" comment="libreoffice-base-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602173" comment="libreoffice-base-drivers-firebird-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602174" comment="libreoffice-base-drivers-postgresql-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602175" comment="libreoffice-branding-upstream-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602176" comment="libreoffice-calc-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602177" comment="libreoffice-calc-extensions-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602178" comment="libreoffice-draw-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602179" comment="libreoffice-filters-optional-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602180" comment="libreoffice-gdb-pretty-printers-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602181" comment="libreoffice-glade-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602182" comment="libreoffice-gnome-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602183" comment="libreoffice-gtk2-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176159" comment="libreoffice-gtk2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602184" comment="libreoffice-gtk3-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602185" comment="libreoffice-icon-themes-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602186" comment="libreoffice-impress-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602187" comment="libreoffice-l10n-af-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602188" comment="libreoffice-l10n-am-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602189" comment="libreoffice-l10n-ar-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602190" comment="libreoffice-l10n-as-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602191" comment="libreoffice-l10n-ast-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602192" comment="libreoffice-l10n-be-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602193" comment="libreoffice-l10n-bg-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602194" comment="libreoffice-l10n-bn-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602195" comment="libreoffice-l10n-bn_IN-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602196" comment="libreoffice-l10n-bo-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602197" comment="libreoffice-l10n-br-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602198" comment="libreoffice-l10n-brx-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602199" comment="libreoffice-l10n-bs-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602200" comment="libreoffice-l10n-ca-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602201" comment="libreoffice-l10n-ca_valencia-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602202" comment="libreoffice-l10n-cs-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602203" comment="libreoffice-l10n-cy-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602204" comment="libreoffice-l10n-da-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602205" comment="libreoffice-l10n-de-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602206" comment="libreoffice-l10n-dgo-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602207" comment="libreoffice-l10n-dsb-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602208" comment="libreoffice-l10n-dz-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602209" comment="libreoffice-l10n-el-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602210" comment="libreoffice-l10n-en-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602211" comment="libreoffice-l10n-en_GB-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602212" comment="libreoffice-l10n-en_ZA-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602213" comment="libreoffice-l10n-eo-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602214" comment="libreoffice-l10n-es-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602215" comment="libreoffice-l10n-et-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602216" comment="libreoffice-l10n-eu-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602217" comment="libreoffice-l10n-fa-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602218" comment="libreoffice-l10n-fi-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602219" comment="libreoffice-l10n-fr-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602220" comment="libreoffice-l10n-fy-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602221" comment="libreoffice-l10n-ga-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602222" comment="libreoffice-l10n-gd-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602223" comment="libreoffice-l10n-gl-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602224" comment="libreoffice-l10n-gu-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602225" comment="libreoffice-l10n-gug-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602226" comment="libreoffice-l10n-he-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602227" comment="libreoffice-l10n-hi-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602228" comment="libreoffice-l10n-hr-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602229" comment="libreoffice-l10n-hsb-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602230" comment="libreoffice-l10n-hu-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602231" comment="libreoffice-l10n-id-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602232" comment="libreoffice-l10n-is-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602233" comment="libreoffice-l10n-it-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602234" comment="libreoffice-l10n-ja-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602235" comment="libreoffice-l10n-ka-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602236" comment="libreoffice-l10n-kab-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602237" comment="libreoffice-l10n-kk-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602238" comment="libreoffice-l10n-km-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602239" comment="libreoffice-l10n-kmr_Latn-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602240" comment="libreoffice-l10n-kn-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602241" comment="libreoffice-l10n-ko-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602242" comment="libreoffice-l10n-kok-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602243" comment="libreoffice-l10n-ks-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602244" comment="libreoffice-l10n-lb-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602245" comment="libreoffice-l10n-lo-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602246" comment="libreoffice-l10n-lt-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602247" comment="libreoffice-l10n-lv-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602248" comment="libreoffice-l10n-mai-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602249" comment="libreoffice-l10n-mk-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602250" comment="libreoffice-l10n-ml-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602251" comment="libreoffice-l10n-mn-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602252" comment="libreoffice-l10n-mni-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602253" comment="libreoffice-l10n-mr-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602254" comment="libreoffice-l10n-my-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602255" comment="libreoffice-l10n-nb-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602256" comment="libreoffice-l10n-ne-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602257" comment="libreoffice-l10n-nl-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602258" comment="libreoffice-l10n-nn-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602259" comment="libreoffice-l10n-nr-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602260" comment="libreoffice-l10n-nso-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602261" comment="libreoffice-l10n-oc-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602262" comment="libreoffice-l10n-om-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602263" comment="libreoffice-l10n-or-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602264" comment="libreoffice-l10n-pa-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602265" comment="libreoffice-l10n-pl-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602266" comment="libreoffice-l10n-pt_BR-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602267" comment="libreoffice-l10n-pt_PT-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602268" comment="libreoffice-l10n-ro-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602269" comment="libreoffice-l10n-ru-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602270" comment="libreoffice-l10n-rw-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602271" comment="libreoffice-l10n-sa_IN-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602272" comment="libreoffice-l10n-sat-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602273" comment="libreoffice-l10n-sd-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602274" comment="libreoffice-l10n-si-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602275" comment="libreoffice-l10n-sid-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602276" comment="libreoffice-l10n-sk-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602277" comment="libreoffice-l10n-sl-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602278" comment="libreoffice-l10n-sq-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602279" comment="libreoffice-l10n-sr-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602280" comment="libreoffice-l10n-ss-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602281" comment="libreoffice-l10n-st-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602282" comment="libreoffice-l10n-sv-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602283" comment="libreoffice-l10n-sw_TZ-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602284" comment="libreoffice-l10n-ta-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602285" comment="libreoffice-l10n-te-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602286" comment="libreoffice-l10n-tg-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602287" comment="libreoffice-l10n-th-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602288" comment="libreoffice-l10n-tn-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602289" comment="libreoffice-l10n-tr-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602290" comment="libreoffice-l10n-ts-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602291" comment="libreoffice-l10n-tt-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602292" comment="libreoffice-l10n-ug-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602293" comment="libreoffice-l10n-uk-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602294" comment="libreoffice-l10n-uz-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602295" comment="libreoffice-l10n-ve-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602296" comment="libreoffice-l10n-vec-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602297" comment="libreoffice-l10n-vi-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602298" comment="libreoffice-l10n-xh-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602299" comment="libreoffice-l10n-zh_CN-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602300" comment="libreoffice-l10n-zh_TW-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602301" comment="libreoffice-l10n-zu-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602302" comment="libreoffice-mailmerge-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602303" comment="libreoffice-math-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602304" comment="libreoffice-officebean-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602305" comment="libreoffice-pyuno-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602306" comment="libreoffice-qt5-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602307" comment="libreoffice-sdk-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602308" comment="libreoffice-sdk-doc-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602309" comment="libreoffice-writer-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602310" comment="libreoffice-writer-extensions-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602311" comment="libreofficekit-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602312" comment="libreofficekit-devel-6.2.5.2-lp151.3.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602313" comment="libwps-0_4-4-0.4.10-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153401" comment="libwps-0_4-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602314" comment="libwps-devel-0.4.10-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153402" comment="libwps-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602315" comment="libwps-tools-0.4.10-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153403" comment="libwps-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602316" comment="mdds-1_4-devel-1.4.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262317" comment="mdds-1_4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602317" comment="myspell-af_NA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153406" comment="myspell-af_NA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602318" comment="myspell-af_ZA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153407" comment="myspell-af_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602319" comment="myspell-an-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153408" comment="myspell-an is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602320" comment="myspell-an_ES-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153409" comment="myspell-an_ES is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602321" comment="myspell-ar-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153410" comment="myspell-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602322" comment="myspell-ar_AE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153411" comment="myspell-ar_AE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602323" comment="myspell-ar_BH-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153412" comment="myspell-ar_BH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602324" comment="myspell-ar_DZ-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153413" comment="myspell-ar_DZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602325" comment="myspell-ar_EG-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153414" comment="myspell-ar_EG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602326" comment="myspell-ar_IQ-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153415" comment="myspell-ar_IQ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602327" comment="myspell-ar_JO-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153416" comment="myspell-ar_JO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602328" comment="myspell-ar_KW-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153417" comment="myspell-ar_KW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602329" comment="myspell-ar_LB-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153418" comment="myspell-ar_LB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602330" comment="myspell-ar_LY-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153419" comment="myspell-ar_LY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602331" comment="myspell-ar_MA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153420" comment="myspell-ar_MA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602332" comment="myspell-ar_OM-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153421" comment="myspell-ar_OM is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602333" comment="myspell-ar_QA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153422" comment="myspell-ar_QA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602334" comment="myspell-ar_SA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153423" comment="myspell-ar_SA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602335" comment="myspell-ar_SD-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153424" comment="myspell-ar_SD is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602336" comment="myspell-ar_SY-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153425" comment="myspell-ar_SY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602337" comment="myspell-ar_TN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153426" comment="myspell-ar_TN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602338" comment="myspell-ar_YE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153427" comment="myspell-ar_YE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602339" comment="myspell-be_BY-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153428" comment="myspell-be_BY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602340" comment="myspell-bg_BG-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153429" comment="myspell-bg_BG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602341" comment="myspell-bn_BD-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153430" comment="myspell-bn_BD is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602342" comment="myspell-bn_IN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153431" comment="myspell-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602343" comment="myspell-bo-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158772" comment="myspell-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602344" comment="myspell-bo_CN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158773" comment="myspell-bo_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602345" comment="myspell-bo_IN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158774" comment="myspell-bo_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602346" comment="myspell-br_FR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153432" comment="myspell-br_FR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602347" comment="myspell-bs-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153433" comment="myspell-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602348" comment="myspell-bs_BA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153434" comment="myspell-bs_BA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602349" comment="myspell-ca-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153435" comment="myspell-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602350" comment="myspell-ca_AD-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153436" comment="myspell-ca_AD is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602351" comment="myspell-ca_ES-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153437" comment="myspell-ca_ES is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602352" comment="myspell-ca_ES_valencia-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153438" comment="myspell-ca_ES_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602353" comment="myspell-ca_FR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153439" comment="myspell-ca_FR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602354" comment="myspell-ca_IT-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153440" comment="myspell-ca_IT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602355" comment="myspell-cs_CZ-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153441" comment="myspell-cs_CZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602356" comment="myspell-da_DK-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153442" comment="myspell-da_DK is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602357" comment="myspell-de-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153443" comment="myspell-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602358" comment="myspell-de_AT-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153444" comment="myspell-de_AT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602359" comment="myspell-de_CH-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153445" comment="myspell-de_CH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602360" comment="myspell-de_DE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153446" comment="myspell-de_DE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602361" comment="myspell-dictionaries-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153447" comment="myspell-dictionaries is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602362" comment="myspell-el_GR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153448" comment="myspell-el_GR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602363" comment="myspell-en-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153449" comment="myspell-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602364" comment="myspell-en_AU-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153450" comment="myspell-en_AU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602365" comment="myspell-en_BS-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153451" comment="myspell-en_BS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602366" comment="myspell-en_BZ-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153452" comment="myspell-en_BZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602367" comment="myspell-en_CA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153453" comment="myspell-en_CA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602368" comment="myspell-en_GB-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153454" comment="myspell-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602369" comment="myspell-en_GH-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153455" comment="myspell-en_GH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602370" comment="myspell-en_IE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153456" comment="myspell-en_IE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602371" comment="myspell-en_IN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153457" comment="myspell-en_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602372" comment="myspell-en_JM-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153458" comment="myspell-en_JM is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602373" comment="myspell-en_MW-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153459" comment="myspell-en_MW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602374" comment="myspell-en_NA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153460" comment="myspell-en_NA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602375" comment="myspell-en_NZ-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153461" comment="myspell-en_NZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602376" comment="myspell-en_PH-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153462" comment="myspell-en_PH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602377" comment="myspell-en_TT-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153463" comment="myspell-en_TT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602378" comment="myspell-en_US-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153464" comment="myspell-en_US is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602379" comment="myspell-en_ZA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153465" comment="myspell-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602380" comment="myspell-en_ZW-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153466" comment="myspell-en_ZW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602381" comment="myspell-es-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153467" comment="myspell-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602382" comment="myspell-es_AR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153468" comment="myspell-es_AR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602383" comment="myspell-es_BO-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153469" comment="myspell-es_BO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602384" comment="myspell-es_CL-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153470" comment="myspell-es_CL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602385" comment="myspell-es_CO-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153471" comment="myspell-es_CO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602386" comment="myspell-es_CR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153472" comment="myspell-es_CR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602387" comment="myspell-es_CU-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153473" comment="myspell-es_CU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602388" comment="myspell-es_DO-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153474" comment="myspell-es_DO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602389" comment="myspell-es_EC-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153475" comment="myspell-es_EC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602390" comment="myspell-es_ES-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153476" comment="myspell-es_ES is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602391" comment="myspell-es_GT-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153477" comment="myspell-es_GT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602392" comment="myspell-es_HN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153478" comment="myspell-es_HN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602393" comment="myspell-es_MX-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153479" comment="myspell-es_MX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602394" comment="myspell-es_NI-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153480" comment="myspell-es_NI is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602395" comment="myspell-es_PA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153481" comment="myspell-es_PA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602396" comment="myspell-es_PE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153482" comment="myspell-es_PE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602397" comment="myspell-es_PR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153483" comment="myspell-es_PR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602398" comment="myspell-es_PY-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153484" comment="myspell-es_PY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602399" comment="myspell-es_SV-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153485" comment="myspell-es_SV is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602400" comment="myspell-es_UY-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153486" comment="myspell-es_UY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602401" comment="myspell-es_VE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153487" comment="myspell-es_VE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602402" comment="myspell-et_EE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153488" comment="myspell-et_EE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602403" comment="myspell-fr_BE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153489" comment="myspell-fr_BE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602404" comment="myspell-fr_CA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153490" comment="myspell-fr_CA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602405" comment="myspell-fr_CH-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153491" comment="myspell-fr_CH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602406" comment="myspell-fr_FR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153492" comment="myspell-fr_FR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602407" comment="myspell-fr_LU-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153493" comment="myspell-fr_LU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602408" comment="myspell-fr_MC-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153494" comment="myspell-fr_MC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602409" comment="myspell-gd_GB-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153495" comment="myspell-gd_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602410" comment="myspell-gl-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153496" comment="myspell-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602411" comment="myspell-gl_ES-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153497" comment="myspell-gl_ES is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602412" comment="myspell-gu_IN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153498" comment="myspell-gu_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602413" comment="myspell-gug-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153499" comment="myspell-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602414" comment="myspell-gug_PY-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153500" comment="myspell-gug_PY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602415" comment="myspell-he_IL-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153501" comment="myspell-he_IL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602416" comment="myspell-hi_IN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153502" comment="myspell-hi_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602417" comment="myspell-hr_HR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153503" comment="myspell-hr_HR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602418" comment="myspell-hu_HU-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153504" comment="myspell-hu_HU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602419" comment="myspell-id-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239767" comment="myspell-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602420" comment="myspell-id_ID-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239768" comment="myspell-id_ID is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602421" comment="myspell-is-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153505" comment="myspell-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602422" comment="myspell-is_IS-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153506" comment="myspell-is_IS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602423" comment="myspell-it_IT-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153507" comment="myspell-it_IT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602424" comment="myspell-kmr_Latn-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153508" comment="myspell-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602425" comment="myspell-kmr_Latn_SY-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153509" comment="myspell-kmr_Latn_SY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602426" comment="myspell-kmr_Latn_TR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153510" comment="myspell-kmr_Latn_TR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602427" comment="myspell-lightproof-en-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153511" comment="myspell-lightproof-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602428" comment="myspell-lightproof-hu_HU-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153512" comment="myspell-lightproof-hu_HU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602429" comment="myspell-lightproof-pt_BR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153513" comment="myspell-lightproof-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602430" comment="myspell-lightproof-ru_RU-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153514" comment="myspell-lightproof-ru_RU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602431" comment="myspell-lo_LA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153515" comment="myspell-lo_LA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602432" comment="myspell-lt_LT-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153516" comment="myspell-lt_LT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602433" comment="myspell-lv_LV-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153517" comment="myspell-lv_LV is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602434" comment="myspell-nb_NO-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153518" comment="myspell-nb_NO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602435" comment="myspell-ne_NP-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153519" comment="myspell-ne_NP is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602436" comment="myspell-nl_BE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153520" comment="myspell-nl_BE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602437" comment="myspell-nl_NL-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153521" comment="myspell-nl_NL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602438" comment="myspell-nn_NO-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153522" comment="myspell-nn_NO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602439" comment="myspell-no-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153523" comment="myspell-no is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602440" comment="myspell-oc_FR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153524" comment="myspell-oc_FR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602441" comment="myspell-pl_PL-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153525" comment="myspell-pl_PL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602442" comment="myspell-pt_AO-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153526" comment="myspell-pt_AO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602443" comment="myspell-pt_BR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153527" comment="myspell-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602444" comment="myspell-pt_PT-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153528" comment="myspell-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602445" comment="myspell-ro-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153529" comment="myspell-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602446" comment="myspell-ro_RO-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153530" comment="myspell-ro_RO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602447" comment="myspell-ru_RU-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153531" comment="myspell-ru_RU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602448" comment="myspell-si_LK-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153532" comment="myspell-si_LK is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602449" comment="myspell-sk_SK-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153533" comment="myspell-sk_SK is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602450" comment="myspell-sl_SI-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153534" comment="myspell-sl_SI is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602451" comment="myspell-sq_AL-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239769" comment="myspell-sq_AL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602452" comment="myspell-sr-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153535" comment="myspell-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602453" comment="myspell-sr_CS-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153536" comment="myspell-sr_CS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602454" comment="myspell-sr_Latn_CS-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153537" comment="myspell-sr_Latn_CS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602455" comment="myspell-sr_Latn_RS-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153538" comment="myspell-sr_Latn_RS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602456" comment="myspell-sr_RS-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153539" comment="myspell-sr_RS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602457" comment="myspell-sv_FI-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153540" comment="myspell-sv_FI is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602458" comment="myspell-sv_SE-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153541" comment="myspell-sv_SE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602459" comment="myspell-sw_TZ-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153542" comment="myspell-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602460" comment="myspell-te-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153543" comment="myspell-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602461" comment="myspell-te_IN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153544" comment="myspell-te_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602462" comment="myspell-th_TH-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153545" comment="myspell-th_TH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602463" comment="myspell-tr-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239770" comment="myspell-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602464" comment="myspell-tr_TR-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239771" comment="myspell-tr_TR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602465" comment="myspell-uk_UA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153546" comment="myspell-uk_UA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602466" comment="myspell-vi-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153547" comment="myspell-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602467" comment="myspell-vi_VN-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153548" comment="myspell-vi_VN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602468" comment="myspell-zu_ZA-20190423-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153549" comment="myspell-zu_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602469" comment="python3-libixion-0.14.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262471" comment="python3-libixion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602470" comment="python3-liborcus-0.14.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262473" comment="python3-liborcus is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16859</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16859" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html" source="SUSE-SU"/>
    <description>
    Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859</cve>
	<bugzilla href="https://bugzilla.suse.com/1109957">SUSE bug 1109957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116587">SUSE bug 1116587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609654" comment="ansible-2.8.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16860</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16860" ref_url="https://www.suse.com/security/cve/CVE-2018-16860" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1888-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16860/">CVE-2018-16860</cve>
	<bugzilla href="https://bugzilla.suse.com/1134024">SUSE bug 1134024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601657" comment="libheimdal-7.7.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162039" comment="libheimdal is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601658" comment="libheimdal-devel-7.7.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162041" comment="libheimdal-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16868</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16868" ref_url="https://www.suse.com/security/cve/CVE-2018-16868" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1351-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005638.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1477-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html" source="SUSE-SU"/>
    <description>
    A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16868/">CVE-2018-16868</cve>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118087">SUSE bug 1118087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134856">SUSE bug 1134856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601352" comment="gnutls-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601353" comment="gnutls-guile-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235743" comment="gnutls-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601354" comment="libgnutls-dane-devel-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235744" comment="libgnutls-dane-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601355" comment="libgnutls-dane0-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177127" comment="libgnutls-dane0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601356" comment="libgnutls-devel-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601357" comment="libgnutls-devel-32bit-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601358" comment="libgnutls30-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601359" comment="libgnutls30-32bit-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235745" comment="libgnutls30-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601360" comment="libgnutlsxx-devel-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601361" comment="libgnutlsxx28-3.6.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16871</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871</cve>
	<bugzilla href="https://bugzilla.suse.com/1137103">SUSE bug 1137103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156320">SUSE bug 1156320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601814" comment="kernel-debug-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601815" comment="kernel-debug-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601816" comment="kernel-debug-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601817" comment="kernel-default-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601818" comment="kernel-default-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601819" comment="kernel-default-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601820" comment="kernel-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601821" comment="kernel-docs-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601822" comment="kernel-docs-html-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601823" comment="kernel-kvmsmall-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601824" comment="kernel-kvmsmall-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601825" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601826" comment="kernel-macros-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601827" comment="kernel-obs-build-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601828" comment="kernel-obs-qa-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601829" comment="kernel-source-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601830" comment="kernel-source-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601831" comment="kernel-syms-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601832" comment="kernel-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601833" comment="kernel-vanilla-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601834" comment="kernel-vanilla-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16873</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
    <description>
    In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named ".git" by using a vanity import path that ends with "/.git". If the Git repository root contains a "HEAD" file, a "config" file, an "objects" directory, a "refs" directory, with some work to ensure the proper ordering of operations, "go get -u" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the "config" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running "go get -u".
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873</cve>
	<bugzilla href="https://bugzilla.suse.com/1118897">SUSE bug 1118897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118898">SUSE bug 1118898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118899">SUSE bug 1118899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601312" comment="containerd-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601313" comment="containerd-ctr-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601314" comment="containerd-test-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153866" comment="containerd-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607614" comment="cri-o-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281964" comment="cri-o is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607615" comment="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281965" comment="cri-o-kubeadm-criconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607616" comment="cri-tools-1.18.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281966" comment="cri-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601315" comment="docker-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601316" comment="docker-bash-completion-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601317" comment="docker-libnetwork-0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601318" comment="docker-runc-1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601319" comment="docker-runc-test-1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171079" comment="docker-runc-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601320" comment="docker-test-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601321" comment="docker-zsh-completion-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601322" comment="go-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153190" comment="go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601323" comment="go-doc-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153191" comment="go-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601324" comment="go-race-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172676" comment="go-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601325" comment="go1.11-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242156" comment="go1.11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601326" comment="go1.11-doc-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242158" comment="go1.11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601327" comment="go1.11-race-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242160" comment="go1.11-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601328" comment="go1.12-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601329" comment="go1.12-doc-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601330" comment="go1.12-race-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607617" comment="go1.14-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607618" comment="go1.14-doc-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607619" comment="go1.14-race-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601331" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607620" comment="kubernetes-apiserver-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281971" comment="kubernetes-apiserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607621" comment="kubernetes-client-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281972" comment="kubernetes-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607622" comment="kubernetes-controller-manager-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281973" comment="kubernetes-controller-manager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607623" comment="kubernetes-kubeadm-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281974" comment="kubernetes-kubeadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607624" comment="kubernetes-kubelet-common-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281975" comment="kubernetes-kubelet-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607625" comment="kubernetes-kubelet1.17-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281976" comment="kubernetes-kubelet1.17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607626" comment="kubernetes-kubelet1.18-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281977" comment="kubernetes-kubelet1.18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607627" comment="kubernetes-master-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281978" comment="kubernetes-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607628" comment="kubernetes-node-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281979" comment="kubernetes-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607629" comment="kubernetes-proxy-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281980" comment="kubernetes-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607630" comment="kubernetes-scheduler-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281981" comment="kubernetes-scheduler is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16874</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16874" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
    <description>
    In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874</cve>
	<bugzilla href="https://bugzilla.suse.com/1118897">SUSE bug 1118897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118898">SUSE bug 1118898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118899">SUSE bug 1118899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601312" comment="containerd-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601313" comment="containerd-ctr-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601314" comment="containerd-test-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153866" comment="containerd-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607614" comment="cri-o-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281964" comment="cri-o is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607615" comment="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281965" comment="cri-o-kubeadm-criconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607616" comment="cri-tools-1.18.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281966" comment="cri-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601315" comment="docker-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601316" comment="docker-bash-completion-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601317" comment="docker-libnetwork-0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601318" comment="docker-runc-1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601319" comment="docker-runc-test-1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171079" comment="docker-runc-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601320" comment="docker-test-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601321" comment="docker-zsh-completion-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601322" comment="go-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153190" comment="go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601323" comment="go-doc-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153191" comment="go-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601324" comment="go-race-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172676" comment="go-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601325" comment="go1.11-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242156" comment="go1.11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601326" comment="go1.11-doc-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242158" comment="go1.11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601327" comment="go1.11-race-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242160" comment="go1.11-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601328" comment="go1.12-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601329" comment="go1.12-doc-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601330" comment="go1.12-race-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607617" comment="go1.14-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607618" comment="go1.14-doc-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607619" comment="go1.14-race-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601331" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607620" comment="kubernetes-apiserver-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281971" comment="kubernetes-apiserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607621" comment="kubernetes-client-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281972" comment="kubernetes-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607622" comment="kubernetes-controller-manager-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281973" comment="kubernetes-controller-manager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607623" comment="kubernetes-kubeadm-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281974" comment="kubernetes-kubeadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607624" comment="kubernetes-kubelet-common-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281975" comment="kubernetes-kubelet-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607625" comment="kubernetes-kubelet1.17-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281976" comment="kubernetes-kubelet1.17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607626" comment="kubernetes-kubelet1.18-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281977" comment="kubernetes-kubelet1.18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607627" comment="kubernetes-master-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281978" comment="kubernetes-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607628" comment="kubernetes-node-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281979" comment="kubernetes-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607629" comment="kubernetes-proxy-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281980" comment="kubernetes-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607630" comment="kubernetes-scheduler-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281981" comment="kubernetes-scheduler is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16875</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16875" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00010.html" source="SUSE-SU"/>
    <description>
    The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875</cve>
	<bugzilla href="https://bugzilla.suse.com/1118897">SUSE bug 1118897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118898">SUSE bug 1118898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118899">SUSE bug 1118899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601312" comment="containerd-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601313" comment="containerd-ctr-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601314" comment="containerd-test-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153866" comment="containerd-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601315" comment="docker-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601316" comment="docker-bash-completion-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601317" comment="docker-libnetwork-0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601318" comment="docker-runc-1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601319" comment="docker-runc-test-1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171079" comment="docker-runc-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601320" comment="docker-test-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601321" comment="docker-zsh-completion-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601322" comment="go-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153190" comment="go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601323" comment="go-doc-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153191" comment="go-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601324" comment="go-race-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172676" comment="go-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601325" comment="go1.11-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242156" comment="go1.11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601326" comment="go1.11-doc-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242158" comment="go1.11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601327" comment="go1.11-race-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242160" comment="go1.11-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601328" comment="go1.12-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601329" comment="go1.12-doc-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601330" comment="go1.12-race-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601331" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16876</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html" source="SUSE-SU"/>
    <description>
    ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876</cve>
	<bugzilla href="https://bugzilla.suse.com/1109957">SUSE bug 1109957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118896">SUSE bug 1118896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609654" comment="ansible-2.8.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16999</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16999" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16999" ref_url="https://www.suse.com/security/cve/CVE-2018-16999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc15 has an invalid memory write (segmentation fault) in expand_smacro in preproc.c, which allows attackers to cause a denial of service via a crafted input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16999/">CVE-2018-16999</cve>
	<bugzilla href="https://bugzilla.suse.com/1108404">SUSE bug 1108404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17229</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17229" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17229" ref_url="https://www.suse.com/security/cve/CVE-2018-17229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Exiv2::d2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17229/">CVE-2018-17229</cve>
	<bugzilla href="https://bugzilla.suse.com/1109175">SUSE bug 1109175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109176">SUSE bug 1109176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17230</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17230" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17230" ref_url="https://www.suse.com/security/cve/CVE-2018-17230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17230/">CVE-2018-17230</cve>
	<bugzilla href="https://bugzilla.suse.com/1109176">SUSE bug 1109176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17282</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17282" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17282" ref_url="https://www.suse.com/security/cve/CVE-2018-17282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17282/">CVE-2018-17282</cve>
	<bugzilla href="https://bugzilla.suse.com/1109299">SUSE bug 1109299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17358</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17359</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17360</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17456</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4088-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603817" comment="strongswan-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603818" comment="strongswan-doc-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603819" comment="strongswan-hmac-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153118" comment="strongswan-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603820" comment="strongswan-ipsec-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603821" comment="strongswan-libs0-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153120" comment="strongswan-libs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603822" comment="strongswan-mysql-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603823" comment="strongswan-nm-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603824" comment="strongswan-sqlite-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17985</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18074</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1754-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601723" comment="python2-requests-2.20.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266797" comment="python2-requests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601724" comment="python2-requests-test-2.20.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266798" comment="python2-requests-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601725" comment="python3-requests-2.20.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152097" comment="python3-requests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601726" comment="python3-requests-test-2.20.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266799" comment="python3-requests-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18225</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18225" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18225" ref_url="https://www.suse.com/security/cve/CVE-2018-18225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.3, the CoAP dissector could crash. This was addressed in epan/dissectors/packet-coap.c by ensuring that the piv length is correctly computed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18225/">CVE-2018-18225</cve>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18226</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18226" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18226" ref_url="https://www.suse.com/security/cve/CVE-2018-18226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.3, the Steam IHS Discovery dissector could consume system memory. This was addressed in epan/dissectors/packet-steam-ihs-discovery.c by changing the memory-management approach.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18226/">CVE-2018-18226</cve>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18227</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18227" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18245</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18245" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18245" ref_url="https://www.suse.com/security/cve/CVE-2018-18245" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html" source="SUSE-SU"/>
    <description>
    Nagios Core 4.4.2 has XSS via the alert summary reports of plugin results, as demonstrated by a SCRIPT element delivered by a modified check_load plugin to NRPE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18245/">CVE-2018-18245</cve>
	<bugzilla href="https://bugzilla.suse.com/1119832">SUSE bug 1119832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607477" comment="nagios-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151576" comment="nagios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607478" comment="nagios-contrib-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281477" comment="nagios-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607479" comment="nagios-devel-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281478" comment="nagios-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607480" comment="nagios-theme-exfoliation-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281479" comment="nagios-theme-exfoliation is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607481" comment="nagios-www-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151577" comment="nagios-www is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607482" comment="nagios-www-dch-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281480" comment="nagios-www-dch is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18246</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18246" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18246" ref_url="https://www.suse.com/security/cve/CVE-2018-18246" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Icinga Web 2 before 2.6.2 has CSRF via /icingaweb2/config/moduledisable?name=monitoring to disable the monitoring module, or via /icingaweb2/config/moduleenable?name=setup to enable the setup module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18246/">CVE-2018-18246</cve>
	<bugzilla href="https://bugzilla.suse.com/1119784">SUSE bug 1119784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609655" comment="icingacli-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275965" comment="icingacli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609656" comment="icingaweb2-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275967" comment="icingaweb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609657" comment="icingaweb2-common-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275969" comment="icingaweb2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609658" comment="icingaweb2-vendor-HTMLPurifier-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275971" comment="icingaweb2-vendor-HTMLPurifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609659" comment="icingaweb2-vendor-JShrink-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275973" comment="icingaweb2-vendor-JShrink is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609660" comment="icingaweb2-vendor-Parsedown-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275975" comment="icingaweb2-vendor-Parsedown is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609661" comment="icingaweb2-vendor-dompdf-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275977" comment="icingaweb2-vendor-dompdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609662" comment="icingaweb2-vendor-lessphp-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275979" comment="icingaweb2-vendor-lessphp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609663" comment="icingaweb2-vendor-zf1-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275981" comment="icingaweb2-vendor-zf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609664" comment="php-Icinga-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275983" comment="php-Icinga is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18247</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18247" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18247" ref_url="https://www.suse.com/security/cve/CVE-2018-18247" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Icinga Web 2 before 2.6.2 has XSS via the /icingaweb2/navigation/add icon parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-18247/">CVE-2018-18247</cve>
	<bugzilla href="https://bugzilla.suse.com/1119785">SUSE bug 1119785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609655" comment="icingacli-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275965" comment="icingacli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609656" comment="icingaweb2-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275967" comment="icingaweb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609657" comment="icingaweb2-common-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275969" comment="icingaweb2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609658" comment="icingaweb2-vendor-HTMLPurifier-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275971" comment="icingaweb2-vendor-HTMLPurifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609659" comment="icingaweb2-vendor-JShrink-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275973" comment="icingaweb2-vendor-JShrink is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609660" comment="icingaweb2-vendor-Parsedown-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275975" comment="icingaweb2-vendor-Parsedown is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609661" comment="icingaweb2-vendor-dompdf-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275977" comment="icingaweb2-vendor-dompdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609662" comment="icingaweb2-vendor-lessphp-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275979" comment="icingaweb2-vendor-lessphp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609663" comment="icingaweb2-vendor-zf1-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275981" comment="icingaweb2-vendor-zf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609664" comment="php-Icinga-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275983" comment="php-Icinga is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18248</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18248" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18248" ref_url="https://www.suse.com/security/cve/CVE-2018-18248" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Icinga Web 2 has XSS via the /icingaweb2/monitoring/list/services dir parameter, the /icingaweb2/user/list query string, the /icingaweb2/monitoring/timeline query string, or the /icingaweb2/setup query string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18248/">CVE-2018-18248</cve>
	<bugzilla href="https://bugzilla.suse.com/1119801">SUSE bug 1119801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609655" comment="icingacli-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275965" comment="icingacli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609656" comment="icingaweb2-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275967" comment="icingaweb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609657" comment="icingaweb2-common-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275969" comment="icingaweb2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609658" comment="icingaweb2-vendor-HTMLPurifier-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275971" comment="icingaweb2-vendor-HTMLPurifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609659" comment="icingaweb2-vendor-JShrink-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275973" comment="icingaweb2-vendor-JShrink is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609660" comment="icingaweb2-vendor-Parsedown-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275975" comment="icingaweb2-vendor-Parsedown is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609661" comment="icingaweb2-vendor-dompdf-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275977" comment="icingaweb2-vendor-dompdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609662" comment="icingaweb2-vendor-lessphp-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275979" comment="icingaweb2-vendor-lessphp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609663" comment="icingaweb2-vendor-zf1-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275981" comment="icingaweb2-vendor-zf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609664" comment="php-Icinga-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275983" comment="php-Icinga is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18249</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18249" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18249" ref_url="https://www.suse.com/security/cve/CVE-2018-18249" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Icinga Web 2 before 2.6.2 allows injection of PHP ini-file directives via vectors involving environment variables as the channel to send information to the attacker, such as a name=${PATH}_${APACHE_RUN_DIR}_${APACHE_RUN_USER} parameter to /icingaweb2/navigation/add or /icingaweb2/dashboard/new-dashlet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-18249/">CVE-2018-18249</cve>
	<bugzilla href="https://bugzilla.suse.com/1119799">SUSE bug 1119799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609655" comment="icingacli-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275965" comment="icingacli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609656" comment="icingaweb2-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275967" comment="icingaweb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609657" comment="icingaweb2-common-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275969" comment="icingaweb2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609658" comment="icingaweb2-vendor-HTMLPurifier-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275971" comment="icingaweb2-vendor-HTMLPurifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609659" comment="icingaweb2-vendor-JShrink-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275973" comment="icingaweb2-vendor-JShrink is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609660" comment="icingaweb2-vendor-Parsedown-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275975" comment="icingaweb2-vendor-Parsedown is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609661" comment="icingaweb2-vendor-dompdf-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275977" comment="icingaweb2-vendor-dompdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609662" comment="icingaweb2-vendor-lessphp-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275979" comment="icingaweb2-vendor-lessphp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609663" comment="icingaweb2-vendor-zf1-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275981" comment="icingaweb2-vendor-zf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609664" comment="php-Icinga-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275983" comment="php-Icinga is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18250</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18250" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18250" ref_url="https://www.suse.com/security/cve/CVE-2018-18250" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Icinga Web 2 before 2.6.2 allows parameters that break navigation dashlets, as demonstrated by a single '$' character as the Name of a Navigation item.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18250/">CVE-2018-18250</cve>
	<bugzilla href="https://bugzilla.suse.com/1119800">SUSE bug 1119800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609655" comment="icingacli-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275965" comment="icingacli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609656" comment="icingaweb2-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275967" comment="icingaweb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609657" comment="icingaweb2-common-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275969" comment="icingaweb2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609658" comment="icingaweb2-vendor-HTMLPurifier-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275971" comment="icingaweb2-vendor-HTMLPurifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609659" comment="icingaweb2-vendor-JShrink-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275973" comment="icingaweb2-vendor-JShrink is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609660" comment="icingaweb2-vendor-Parsedown-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275975" comment="icingaweb2-vendor-Parsedown is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609661" comment="icingaweb2-vendor-dompdf-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275977" comment="icingaweb2-vendor-dompdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609662" comment="icingaweb2-vendor-lessphp-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275979" comment="icingaweb2-vendor-lessphp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609663" comment="icingaweb2-vendor-zf1-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275981" comment="icingaweb2-vendor-zf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609664" comment="php-Icinga-2.7.3-lp151.6.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275983" comment="php-Icinga is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18309</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18310</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18483</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18484</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18508</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18508" ref_url="https://www.suse.com/security/cve/CVE-2018-18508" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html" source="SUSE-SU"/>
    <description>
    In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18508/">CVE-2018-18508</cve>
	<bugzilla href="https://bugzilla.suse.com/1124571">SUSE bug 1124571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608465" comment="libfreebl3-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608466" comment="libfreebl3-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608467" comment="libfreebl3-hmac-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608468" comment="libfreebl3-hmac-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608469" comment="libsoftokn3-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608470" comment="libsoftokn3-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608471" comment="libsoftokn3-hmac-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608472" comment="libsoftokn3-hmac-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608473" comment="mozilla-nspr-4.23-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608474" comment="mozilla-nspr-32bit-4.23-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608475" comment="mozilla-nspr-devel-4.23-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608476" comment="mozilla-nss-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608477" comment="mozilla-nss-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608478" comment="mozilla-nss-certs-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608479" comment="mozilla-nss-certs-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608480" comment="mozilla-nss-devel-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608481" comment="mozilla-nss-sysinit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608482" comment="mozilla-nss-sysinit-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608483" comment="mozilla-nss-tools-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18520</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18521</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18541</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18541" ref_url="https://www.suse.com/security/cve/CVE-2018-18541" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00077.html" source="SUSE-SU"/>
    <description>
    In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-18541/">CVE-2018-18541</cve>
	<bugzilla href="https://bugzilla.suse.com/1112910">SUSE bug 1112910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601972" comment="teeworlds-0.7.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266800" comment="teeworlds is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18605</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18606</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18607</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18751" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18751" ref_url="https://www.suse.com/security/cve/CVE-2018-18751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18751/">CVE-2018-18751</cve>
	<bugzilla href="https://bugzilla.suse.com/1113719">SUSE bug 1113719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604983" comment="gettext-csharp-0.19.8.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290347" comment="gettext-csharp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604984" comment="gettext-java-0.19.8.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290348" comment="gettext-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604985" comment="gettext-runtime-0.19.8.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290349" comment="gettext-runtime is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604986" comment="gettext-runtime-32bit-0.19.8.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290350" comment="gettext-runtime-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604987" comment="gettext-runtime-mini-0.19.8.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290351" comment="gettext-runtime-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604988" comment="gettext-runtime-mini-tools-doc-0.19.8.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290352" comment="gettext-runtime-mini-tools-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604989" comment="gettext-runtime-tools-doc-0.19.8.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290353" comment="gettext-runtime-tools-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604990" comment="gettext-tools-0.19.8.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290354" comment="gettext-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604991" comment="gettext-tools-mini-0.19.8.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009290355" comment="gettext-tools-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18873</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function ras_putdatastd in ras/ras_enc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873</cve>
	<bugzilla href="https://bugzilla.suse.com/1114495">SUSE bug 1114495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114498">SUSE bug 1114498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19052</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19052" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19052" ref_url="https://www.suse.com/security/cve/CVE-2018-19052" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00054.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19052/">CVE-2018-19052</cve>
	<bugzilla href="https://bugzilla.suse.com/1115016">SUSE bug 1115016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609665" comment="lighttpd-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268321" comment="lighttpd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609666" comment="lighttpd-mod_authn_gssapi-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268323" comment="lighttpd-mod_authn_gssapi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609667" comment="lighttpd-mod_authn_ldap-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268325" comment="lighttpd-mod_authn_ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609668" comment="lighttpd-mod_authn_mysql-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268327" comment="lighttpd-mod_authn_mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609669" comment="lighttpd-mod_authn_pam-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268329" comment="lighttpd-mod_authn_pam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609670" comment="lighttpd-mod_authn_sasl-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268331" comment="lighttpd-mod_authn_sasl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609671" comment="lighttpd-mod_cml-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268333" comment="lighttpd-mod_cml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609672" comment="lighttpd-mod_geoip-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268335" comment="lighttpd-mod_geoip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609673" comment="lighttpd-mod_magnet-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268337" comment="lighttpd-mod_magnet is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609674" comment="lighttpd-mod_maxminddb-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268339" comment="lighttpd-mod_maxminddb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609675" comment="lighttpd-mod_mysql_vhost-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268341" comment="lighttpd-mod_mysql_vhost is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609676" comment="lighttpd-mod_rrdtool-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268343" comment="lighttpd-mod_rrdtool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609677" comment="lighttpd-mod_trigger_b4_dl-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268345" comment="lighttpd-mod_trigger_b4_dl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609678" comment="lighttpd-mod_vhostdb_dbi-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268347" comment="lighttpd-mod_vhostdb_dbi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609679" comment="lighttpd-mod_vhostdb_ldap-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268349" comment="lighttpd-mod_vhostdb_ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609680" comment="lighttpd-mod_vhostdb_mysql-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268351" comment="lighttpd-mod_vhostdb_mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609681" comment="lighttpd-mod_vhostdb_pgsql-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268353" comment="lighttpd-mod_vhostdb_pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609682" comment="lighttpd-mod_webdav-1.4.54-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268355" comment="lighttpd-mod_webdav is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19108</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19108" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19108" ref_url="https://www.suse.com/security/cve/CVE-2018-19108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    In Exiv2 0.26, Exiv2::PsdImage::readMetadata in psdimage.cpp in the PSD image reader may suffer from a denial of service (infinite loop) caused by an integer overflow via a crafted PSD image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19108/">CVE-2018-19108</cve>
	<bugzilla href="https://bugzilla.suse.com/1115364">SUSE bug 1115364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    An issue has been found in JasPer 2.0.14. There is a memory leak in jas_malloc.c when called from jpc_unk_getparms in jpc_cs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139</cve>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19214</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19214" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19214" ref_url="https://www.suse.com/security/cve/CVE-2018-19214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc15 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for insufficient input.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19214/">CVE-2018-19214</cve>
	<bugzilla href="https://bugzilla.suse.com/1115795">SUSE bug 1115795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19215" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19215" ref_url="https://www.suse.com/security/cve/CVE-2018-19215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.14rc16 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for the special cases of the % and $ and ! characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19215/">CVE-2018-19215</cve>
	<bugzilla href="https://bugzilla.suse.com/1115774">SUSE bug 1115774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19216</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19216" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19216" ref_url="https://www.suse.com/security/cve/CVE-2018-19216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) before 2.13.02 has a use-after-free in detoken at asm/preproc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19216/">CVE-2018-19216</cve>
	<bugzilla href="https://bugzilla.suse.com/1115758">SUSE bug 1115758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19387</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19387" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19387" ref_url="https://www.suse.com/security/cve/CVE-2018-19387" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00020.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19387/">CVE-2018-19387</cve>
	<bugzilla href="https://bugzilla.suse.com/1116887">SUSE bug 1116887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609683" comment="tmux-3.1c-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298611" comment="tmux is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00023.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16. There is a heap-based buffer overflow of size 1 in the function jas_icctxtdesc_input in libjasper/base/jas_icc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540</cve>
	<bugzilla href="https://bugzilla.suse.com/1117508">SUSE bug 1117508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603243" comment="jasper-2.0.14-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603244" comment="libjasper-devel-2.0.14-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603245" comment="libjasper4-2.0.14-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603246" comment="libjasper4-32bit-2.0.14-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19541</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00023.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16. There is a heap-based buffer over-read of size 8 in the function jas_image_depalettize in libjasper/base/jas_image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541</cve>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119411">SUSE bug 1119411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603243" comment="jasper-2.0.14-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603244" comment="libjasper-devel-2.0.14-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603245" comment="libjasper4-2.0.14-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603246" comment="libjasper4-32bit-2.0.14-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19543" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in JasPer 2.0.14. There is a heap-based buffer over-read of size 8 in the function jp2_decode in libjasper/jp2/jp2_dec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543</cve>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19607</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19607" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19607" ref_url="https://www.suse.com/security/cve/CVE-2018-19607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19607/">CVE-2018-19607</cve>
	<bugzilla href="https://bugzilla.suse.com/1117513">SUSE bug 1117513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19623</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19623" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the LBMPDM dissector could crash. In addition, a remote attacker could write arbitrary data to any memory locations before the packet-scoped memory. This was addressed in epan/dissectors/packet-lbmpdm.c by disallowing certain negative values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19624</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19624" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19625" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the dissection engine could crash. This was addressed in epan/tvbuff_composite.c by preventing a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19626</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19626" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the DCOM dissector could crash. This was addressed in epan/dissectors/packet-dcom.c by adding '\0' termination.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19627</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19627" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by adjusting a buffer boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19628</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19628" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19628" ref_url="https://www.suse.com/security/cve/CVE-2018-19628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4, the ZigBee ZCL dissector could crash. This was addressed in epan/dissectors/packet-zbee-zcl-lighting.c by preventing a divide-by-zero error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19628/">CVE-2018-19628</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19797" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19797" ref_url="https://www.suse.com/security/cve/CVE-2018-19797" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Selector_List::populate_extends in SharedPtr.hpp (used by ast.cpp and ast_selectors.cpp) may cause a Denial of Service (application crash) via a crafted sass input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-19797/">CVE-2018-19797</cve>
	<bugzilla href="https://bugzilla.suse.com/1118301">SUSE bug 1118301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19800</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19800" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19800" ref_url="https://www.suse.com/security/cve/CVE-2018-19800" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00067.html" source="SUSE-SU"/>
    <description>
    aubio v0.4.0 to v0.4.8 has a Buffer Overflow in new_aubio_tempo.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19800/">CVE-2018-19800</cve>
	<bugzilla href="https://bugzilla.suse.com/1137828">SUSE bug 1137828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142436">SUSE bug 1142436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601609" comment="aubio-tools-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174088" comment="aubio-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601610" comment="libaubio-devel-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174089" comment="libaubio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601611" comment="libaubio5-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229463" comment="libaubio5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601612" comment="libaubio5-32bit-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229464" comment="libaubio5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601613" comment="python2-aubio-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229466" comment="python2-aubio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601614" comment="python3-aubio-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229467" comment="python3-aubio is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19801</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19801" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19801" ref_url="https://www.suse.com/security/cve/CVE-2018-19801" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00067.html" source="SUSE-SU"/>
    <description>
    aubio v0.4.0 to v0.4.8 has a NULL pointer dereference in new_aubio_filterbank via invalid n_filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19801/">CVE-2018-19801</cve>
	<bugzilla href="https://bugzilla.suse.com/1137822">SUSE bug 1137822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142433">SUSE bug 1142433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601609" comment="aubio-tools-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174088" comment="aubio-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601610" comment="libaubio-devel-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174089" comment="libaubio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601611" comment="libaubio5-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229463" comment="libaubio5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601612" comment="libaubio5-32bit-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229464" comment="libaubio5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601613" comment="python2-aubio-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229466" comment="python2-aubio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601614" comment="python3-aubio-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229467" comment="python3-aubio is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19802" ref_url="https://www.suse.com/security/cve/CVE-2018-19802" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1852-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00012.html" source="SUSE-SU"/>
    <description>
    aubio v0.4.0 to v0.4.8 has a new_aubio_onset NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19802/">CVE-2018-19802</cve>
	<bugzilla href="https://bugzilla.suse.com/1137823">SUSE bug 1137823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601609" comment="aubio-tools-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174088" comment="aubio-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601610" comment="libaubio-devel-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174089" comment="libaubio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601611" comment="libaubio5-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229463" comment="libaubio5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601612" comment="libaubio5-32bit-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229464" comment="libaubio5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601613" comment="python2-aubio-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229466" comment="python2-aubio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601614" comment="python3-aubio-0.4.6-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229467" comment="python3-aubio is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19827</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19827" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19827" ref_url="https://www.suse.com/security/cve/CVE-2018-19827" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    In LibSass 3.5.5, a use-after-free vulnerability exists in the SharedPtr class in SharedPtr.cpp (or SharedPtr.hpp) that may cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-19827/">CVE-2018-19827</cve>
	<bugzilla href="https://bugzilla.suse.com/1118346">SUSE bug 1118346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19837</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19837" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19837" ref_url="https://www.suse.com/security/cve/CVE-2018-19837" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    In LibSass prior to 3.5.5, Sass::Eval::operator()(Sass::Binary_Expression*) inside eval.cpp allows attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, because of certain incorrect parsing of '%' as a modulo operator in parser.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-19837/">CVE-2018-19837</cve>
	<bugzilla href="https://bugzilla.suse.com/1118348">SUSE bug 1118348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19838</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19838" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19838" ref_url="https://www.suse.com/security/cve/CVE-2018-19838" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    In LibSass prior to 3.5.5, functions inside ast.cpp for IMPLEMENT_AST_OPERATORS expansion allow attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, as demonstrated by recursive calls involving clone(), cloneChildren(), and copy().
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-19838/">CVE-2018-19838</cve>
	<bugzilla href="https://bugzilla.suse.com/1118349">SUSE bug 1118349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19839</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19839" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19839" ref_url="https://www.suse.com/security/cve/CVE-2018-19839" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    In LibSass prior to 3.5.5, the function handle_error in sass_context.cpp allows attackers to cause a denial-of-service resulting from a heap-based buffer over-read via a crafted sass file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-19839/">CVE-2018-19839</cve>
	<bugzilla href="https://bugzilla.suse.com/1118351">SUSE bug 1118351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19840</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19840" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19841</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19841" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841</cve>
	<bugzilla href="https://bugzilla.suse.com/1120929">SUSE bug 1120929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19857</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19857" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19857" ref_url="https://www.suse.com/security/cve/CVE-2018-19857" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html" source="SUSE-SU"/>
    <description>
    The CAF demuxer in modules/demux/caf.c in VideoLAN VLC media player 3.0.4 may read memory from an uninitialized pointer when processing magic cookies in CAF files, because a ReadKukiChunk() cast converts a return value to an unsigned int even if that value is negative. This could result in a denial of service and/or a potential infoleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19857/">CVE-2018-19857</cve>
	<bugzilla href="https://bugzilla.suse.com/1118586">SUSE bug 1118586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602032" comment="libvlc5-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602033" comment="libvlccore9-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602034" comment="vlc-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602035" comment="vlc-codec-gstreamer-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602036" comment="vlc-devel-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602037" comment="vlc-jack-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602038" comment="vlc-lang-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602039" comment="vlc-noX-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602040" comment="vlc-qt-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602041" comment="vlc-vdpau-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19869</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19869" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. A malformed SVG image causes a segmentation fault in qsvghandler.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869</cve>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605258" comment="libqt4-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605259" comment="libqt4-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605260" comment="libqt4-devel-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605261" comment="libqt4-devel-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230219" comment="libqt4-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605262" comment="libqt4-devel-doc-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230220" comment="libqt4-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605263" comment="libqt4-devel-doc-data-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230221" comment="libqt4-devel-doc-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605264" comment="libqt4-linguist-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605265" comment="libqt4-private-headers-devel-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230222" comment="libqt4-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605266" comment="libqt4-qt3support-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605267" comment="libqt4-qt3support-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605268" comment="libqt4-sql-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605269" comment="libqt4-sql-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605270" comment="libqt4-sql-postgresql-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605271" comment="libqt4-sql-sqlite-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605272" comment="libqt4-sql-sqlite-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605273" comment="libqt4-sql-unixODBC-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605274" comment="libqt4-x11-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605275" comment="libqt4-x11-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605276" comment="qt4-x11-tools-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230226" comment="qt4-x11-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19873</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. QBmpHandler has a buffer overflow via BMP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605258" comment="libqt4-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605259" comment="libqt4-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605260" comment="libqt4-devel-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605261" comment="libqt4-devel-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230219" comment="libqt4-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605262" comment="libqt4-devel-doc-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230220" comment="libqt4-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605263" comment="libqt4-devel-doc-data-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230221" comment="libqt4-devel-doc-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605264" comment="libqt4-linguist-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605265" comment="libqt4-private-headers-devel-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230222" comment="libqt4-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605266" comment="libqt4-qt3support-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605267" comment="libqt4-qt3support-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605268" comment="libqt4-sql-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605269" comment="libqt4-sql-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605270" comment="libqt4-sql-postgresql-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605271" comment="libqt4-sql-sqlite-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605272" comment="libqt4-sql-sqlite-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605273" comment="libqt4-sql-unixODBC-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605274" comment="libqt4-x11-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605275" comment="libqt4-x11-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605276" comment="qt4-x11-tools-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230226" comment="qt4-x11-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19931</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19932</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19935" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19935" ref_url="https://www.suse.com/security/cve/CVE-2018-19935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19935/">CVE-2018-19935</cve>
	<bugzilla href="https://bugzilla.suse.com/1118832">SUSE bug 1118832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20030</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20030" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608454" comment="libexif-devel-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608455" comment="libexif-devel-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279253" comment="libexif-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608456" comment="libexif12-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608457" comment="libexif12-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20073</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20073" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20073" ref_url="https://www.suse.com/security/cve/CVE-2018-20073" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00057.html" source="SUSE-SU"/>
    <description>
    Use of extended attributes in downloads in Google Chrome prior to 72.0.3626.81 allowed a local attacker to read download URLs via the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20073/">CVE-2018-20073</cve>
	<bugzilla href="https://bugzilla.suse.com/1120892">SUSE bug 1120892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609684" comment="chromedriver-75.0.3770.142-lp151.2.12.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609685" comment="chromium-75.0.3770.142-lp151.2.12.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20105</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20105" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20105" ref_url="https://www.suse.com/security/cve/CVE-2018-20105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0629-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190629-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006571.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A Inclusion of Sensitive Information in Log Files vulnerability in yast2-rmt of SUSE Linux Enterprise Server 15; openSUSE Leap allows local attackers to learn the password if they can access the log file. This issue affects: SUSE Linux Enterprise Server 15 yast2-rmt versions prior to 1.2.2. openSUSE Leap yast2-rmt versions prior to 1.2.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20105/">CVE-2018-20105</cve>
	<bugzilla href="https://bugzilla.suse.com/1119835">SUSE bug 1119835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607022" comment="yast2-rmt-1.3.0-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242427" comment="yast2-rmt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20126</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
    <description>
    hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126</cve>
	<bugzilla href="https://bugzilla.suse.com/1119991">SUSE bug 1119991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603672" comment="qemu-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603673" comment="qemu-arm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603674" comment="qemu-audio-alsa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603675" comment="qemu-audio-oss-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603676" comment="qemu-audio-pa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603677" comment="qemu-audio-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603678" comment="qemu-block-curl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603679" comment="qemu-block-dmg-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603680" comment="qemu-block-gluster-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603681" comment="qemu-block-iscsi-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603682" comment="qemu-block-nfs-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603683" comment="qemu-block-rbd-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603684" comment="qemu-block-ssh-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603685" comment="qemu-extra-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603686" comment="qemu-guest-agent-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603687" comment="qemu-ipxe-1.0.0+-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603688" comment="qemu-ksm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603689" comment="qemu-kvm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603690" comment="qemu-lang-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603691" comment="qemu-linux-user-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603692" comment="qemu-ppc-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603693" comment="qemu-s390-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603694" comment="qemu-seabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603695" comment="qemu-sgabios-8-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603696" comment="qemu-tools-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603697" comment="qemu-ui-curses-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603698" comment="qemu-ui-gtk-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603699" comment="qemu-ui-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603700" comment="qemu-vgabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603701" comment="qemu-x86-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20174</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20174" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20174" ref_url="https://www.suse.com/security/cve/CVE-2018-20174" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20174/">CVE-2018-20174</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20175</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20175" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20175" ref_url="https://www.suse.com/security/cve/CVE-2018-20175" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20175/">CVE-2018-20175</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20176</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20176" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20176" ref_url="https://www.suse.com/security/cve/CVE-2018-20176" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain several Out-Of- Bounds Reads in the file secure.c that result in a Denial of Service (segfault).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20176/">CVE-2018-20176</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20177</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20177" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20177" ref_url="https://www.suse.com/security/cve/CVE-2018-20177" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20177/">CVE-2018-20177</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20178</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20178" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20178" ref_url="https://www.suse.com/security/cve/CVE-2018-20178" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20178/">CVE-2018-20178</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20179</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20179" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20179" ref_url="https://www.suse.com/security/cve/CVE-2018-20179" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function lspci_process() and results in memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20179/">CVE-2018-20179</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20180</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20180" ref_url="https://www.suse.com/security/cve/CVE-2018-20180" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20180/">CVE-2018-20180</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20181</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20181" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20181" ref_url="https://www.suse.com/security/cve/CVE-2018-20181" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20181/">CVE-2018-20181</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20182</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20182" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20182" ref_url="https://www.suse.com/security/cve/CVE-2018-20182" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20182/">CVE-2018-20182</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20190</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20190" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20190" ref_url="https://www.suse.com/security/cve/CVE-2018-20190" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Eval::operator()(Sass::Supports_Operator*) in eval.cpp may cause a Denial of Service (application crash) via a crafted sass input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20190/">CVE-2018-20190</cve>
	<bugzilla href="https://bugzilla.suse.com/1119789">SUSE bug 1119789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20340</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20340" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20340" ref_url="https://www.suse.com/security/cve/CVE-2018-20340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRDOETNQVM5LVLJRZMNGQEBNRFW4ZWEV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6NOI7O3I53SFL6DVLZH5VWF6EO4AISA/" source="SUSE-SU"/>
    <description>
    Yubico libu2f-host 1.1.6 contains unchecked buffers in devs.c, which could enable a malicious token to exploit a buffer overflow. An attacker could use this to attempt to execute malicious code using a crafted USB device masquerading as a security token on a computer where the affected library is currently in use. It is not possible to perform this attack with a genuine YubiKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20340/">CVE-2018-20340</cve>
	<bugzilla href="https://bugzilla.suse.com/1124781">SUSE bug 1124781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601340" comment="libu2f-host-devel-1.1.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244552" comment="libu2f-host-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601341" comment="libu2f-host-doc-1.1.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244553" comment="libu2f-host-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601342" comment="libu2f-host0-1.1.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244554" comment="libu2f-host0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601343" comment="u2f-host-1.1.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244555" comment="u2f-host is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20406</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20406" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20532</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20532" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609687" comment="PackageKit-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174862" comment="PackageKit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609688" comment="PackageKit-backend-zypp-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174863" comment="PackageKit-backend-zypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609689" comment="PackageKit-branding-upstream-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174864" comment="PackageKit-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609690" comment="PackageKit-devel-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174865" comment="PackageKit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609691" comment="PackageKit-gstreamer-plugin-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174866" comment="PackageKit-gstreamer-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609692" comment="PackageKit-gtk3-module-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174867" comment="PackageKit-gtk3-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609693" comment="PackageKit-lang-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174868" comment="PackageKit-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609694" comment="libpackagekit-glib2-18-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174869" comment="libpackagekit-glib2-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609695" comment="libpackagekit-glib2-18-32bit-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174870" comment="libpackagekit-glib2-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609696" comment="libpackagekit-glib2-devel-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174871" comment="libpackagekit-glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609697" comment="libpackagekit-glib2-devel-32bit-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174872" comment="libpackagekit-glib2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609698" comment="libsolv-demo-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234725" comment="libsolv-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609699" comment="libsolv-devel-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234726" comment="libsolv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609700" comment="libsolv-tools-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234727" comment="libsolv-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609701" comment="libyui-ncurses-pkg-devel-2.48.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262475" comment="libyui-ncurses-pkg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609702" comment="libyui-ncurses-pkg-doc-2.48.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272847" comment="libyui-ncurses-pkg-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609703" comment="libyui-ncurses-pkg9-2.48.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272849" comment="libyui-ncurses-pkg9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609704" comment="libyui-qt-pkg-devel-2.45.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262478" comment="libyui-qt-pkg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609705" comment="libyui-qt-pkg-doc-2.45.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272853" comment="libyui-qt-pkg-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609706" comment="libyui-qt-pkg9-2.45.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272855" comment="libyui-qt-pkg9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609707" comment="libzypp-17.15.0-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161722" comment="libzypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609708" comment="libzypp-devel-17.15.0-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161723" comment="libzypp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609709" comment="libzypp-devel-doc-17.15.0-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161724" comment="libzypp-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609710" comment="perl-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234728" comment="perl-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609711" comment="python-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234729" comment="python-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609712" comment="python3-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234730" comment="python3-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609713" comment="ruby-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234731" comment="ruby-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609714" comment="typelib-1_0-PackageKitGlib-1_0-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174873" comment="typelib-1_0-PackageKitGlib-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609715" comment="yast2-pkg-bindings-4.1.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162967" comment="yast2-pkg-bindings is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609716" comment="yast2-pkg-bindings-devel-doc-4.1.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162968" comment="yast2-pkg-bindings-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609717" comment="zypper-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251910" comment="zypper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609718" comment="zypper-aptitude-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251911" comment="zypper-aptitude is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609719" comment="zypper-log-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251912" comment="zypper-log is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609720" comment="zypper-needs-restarting-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262480" comment="zypper-needs-restarting is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20533</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20533" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609687" comment="PackageKit-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174862" comment="PackageKit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609688" comment="PackageKit-backend-zypp-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174863" comment="PackageKit-backend-zypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609689" comment="PackageKit-branding-upstream-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174864" comment="PackageKit-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609690" comment="PackageKit-devel-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174865" comment="PackageKit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609691" comment="PackageKit-gstreamer-plugin-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174866" comment="PackageKit-gstreamer-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609692" comment="PackageKit-gtk3-module-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174867" comment="PackageKit-gtk3-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609693" comment="PackageKit-lang-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174868" comment="PackageKit-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609694" comment="libpackagekit-glib2-18-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174869" comment="libpackagekit-glib2-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609695" comment="libpackagekit-glib2-18-32bit-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174870" comment="libpackagekit-glib2-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609696" comment="libpackagekit-glib2-devel-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174871" comment="libpackagekit-glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609697" comment="libpackagekit-glib2-devel-32bit-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174872" comment="libpackagekit-glib2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609698" comment="libsolv-demo-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234725" comment="libsolv-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609699" comment="libsolv-devel-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234726" comment="libsolv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609700" comment="libsolv-tools-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234727" comment="libsolv-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609701" comment="libyui-ncurses-pkg-devel-2.48.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262475" comment="libyui-ncurses-pkg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609702" comment="libyui-ncurses-pkg-doc-2.48.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272847" comment="libyui-ncurses-pkg-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609703" comment="libyui-ncurses-pkg9-2.48.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272849" comment="libyui-ncurses-pkg9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609704" comment="libyui-qt-pkg-devel-2.45.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262478" comment="libyui-qt-pkg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609705" comment="libyui-qt-pkg-doc-2.45.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272853" comment="libyui-qt-pkg-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609706" comment="libyui-qt-pkg9-2.45.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272855" comment="libyui-qt-pkg9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609707" comment="libzypp-17.15.0-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161722" comment="libzypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609708" comment="libzypp-devel-17.15.0-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161723" comment="libzypp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609709" comment="libzypp-devel-doc-17.15.0-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161724" comment="libzypp-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609710" comment="perl-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234728" comment="perl-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609711" comment="python-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234729" comment="python-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609712" comment="python3-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234730" comment="python3-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609713" comment="ruby-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234731" comment="ruby-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609714" comment="typelib-1_0-PackageKitGlib-1_0-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174873" comment="typelib-1_0-PackageKitGlib-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609715" comment="yast2-pkg-bindings-4.1.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162967" comment="yast2-pkg-bindings is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609716" comment="yast2-pkg-bindings-devel-doc-4.1.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162968" comment="yast2-pkg-bindings-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609717" comment="zypper-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251910" comment="zypper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609718" comment="zypper-aptitude-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251911" comment="zypper-aptitude is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609719" comment="zypper-log-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251912" comment="zypper-log is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609720" comment="zypper-needs-restarting-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262480" comment="zypper-needs-restarting is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20534</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20534" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** There is an illegal address access at ext/testcase.c in libsolv.a in libsolv through 0.7.2 that will cause a denial of service. NOTE: third parties dispute this issue stating that the issue affects the test suite and not the underlying library. It cannot be exploited in any real-world application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609687" comment="PackageKit-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174862" comment="PackageKit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609688" comment="PackageKit-backend-zypp-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174863" comment="PackageKit-backend-zypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609689" comment="PackageKit-branding-upstream-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174864" comment="PackageKit-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609690" comment="PackageKit-devel-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174865" comment="PackageKit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609691" comment="PackageKit-gstreamer-plugin-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174866" comment="PackageKit-gstreamer-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609692" comment="PackageKit-gtk3-module-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174867" comment="PackageKit-gtk3-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609693" comment="PackageKit-lang-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174868" comment="PackageKit-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609694" comment="libpackagekit-glib2-18-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174869" comment="libpackagekit-glib2-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609695" comment="libpackagekit-glib2-18-32bit-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174870" comment="libpackagekit-glib2-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609696" comment="libpackagekit-glib2-devel-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174871" comment="libpackagekit-glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609697" comment="libpackagekit-glib2-devel-32bit-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174872" comment="libpackagekit-glib2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609698" comment="libsolv-demo-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234725" comment="libsolv-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609699" comment="libsolv-devel-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234726" comment="libsolv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609700" comment="libsolv-tools-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234727" comment="libsolv-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609701" comment="libyui-ncurses-pkg-devel-2.48.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262475" comment="libyui-ncurses-pkg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609702" comment="libyui-ncurses-pkg-doc-2.48.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272847" comment="libyui-ncurses-pkg-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609703" comment="libyui-ncurses-pkg9-2.48.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272849" comment="libyui-ncurses-pkg9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609704" comment="libyui-qt-pkg-devel-2.45.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262478" comment="libyui-qt-pkg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609705" comment="libyui-qt-pkg-doc-2.45.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272853" comment="libyui-qt-pkg-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609706" comment="libyui-qt-pkg9-2.45.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009272855" comment="libyui-qt-pkg9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609707" comment="libzypp-17.15.0-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161722" comment="libzypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609708" comment="libzypp-devel-17.15.0-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161723" comment="libzypp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609709" comment="libzypp-devel-doc-17.15.0-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161724" comment="libzypp-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609710" comment="perl-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234728" comment="perl-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609711" comment="python-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234729" comment="python-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609712" comment="python3-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234730" comment="python3-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609713" comment="ruby-solv-0.7.6-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234731" comment="ruby-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609714" comment="typelib-1_0-PackageKitGlib-1_0-1.1.10-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174873" comment="typelib-1_0-PackageKitGlib-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609715" comment="yast2-pkg-bindings-4.1.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162967" comment="yast2-pkg-bindings is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609716" comment="yast2-pkg-bindings-devel-doc-4.1.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162968" comment="yast2-pkg-bindings-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609717" comment="zypper-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251910" comment="zypper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609718" comment="zypper-aptitude-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251911" comment="zypper-aptitude is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609719" comment="zypper-log-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251912" comment="zypper-log is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609720" comment="zypper-needs-restarting-1.14.30-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262480" comment="zypper-needs-restarting is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20570</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20570" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    jp2_encode in jp2/jp2_enc.c in JasPer 2.0.14 has a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570</cve>
	<bugzilla href="https://bugzilla.suse.com/1120807">SUSE bug 1120807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.14 has a memory leak in base/jas_malloc.c in libjasper.a when "--output-format jp2" is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622</cve>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120805">SUSE bug 1120805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20623</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20651</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20669</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
    <description>
    An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<bugzilla href="https://bugzilla.suse.com/1122971">SUSE bug 1122971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606701" comment="kernel-debug-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606702" comment="kernel-debug-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606703" comment="kernel-debug-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606704" comment="kernel-default-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606705" comment="kernel-default-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606706" comment="kernel-default-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606707" comment="kernel-devel-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606708" comment="kernel-docs-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606709" comment="kernel-docs-html-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606710" comment="kernel-kvmsmall-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606711" comment="kernel-kvmsmall-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606712" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606713" comment="kernel-macros-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606714" comment="kernel-obs-build-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606715" comment="kernel-obs-qa-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606716" comment="kernel-source-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606717" comment="kernel-source-vanilla-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606718" comment="kernel-syms-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606719" comment="kernel-vanilla-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606720" comment="kernel-vanilla-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606721" comment="kernel-vanilla-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20671</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20723</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20723" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20723" ref_url="https://www.suse.com/security/cve/CVE-2018-20723" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    A cross-site scripting (XSS) vulnerability exists in color_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Name field for a Color.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20723/">CVE-2018-20723</cve>
	<bugzilla href="https://bugzilla.suse.com/1122245">SUSE bug 1122245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20724</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20724" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20724" ref_url="https://www.suse.com/security/cve/CVE-2018-20724" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    A cross-site scripting (XSS) vulnerability exists in pollers.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname for Data Collectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20724/">CVE-2018-20724</cve>
	<bugzilla href="https://bugzilla.suse.com/1122244">SUSE bug 1122244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20725</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20725" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20725" ref_url="https://www.suse.com/security/cve/CVE-2018-20725" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    A cross-site scripting (XSS) vulnerability exists in graph_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Graph Vertical Label.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20725/">CVE-2018-20725</cve>
	<bugzilla href="https://bugzilla.suse.com/1122243">SUSE bug 1122243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20726</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20726" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20726" ref_url="https://www.suse.com/security/cve/CVE-2018-20726" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    A cross-site scripting (XSS) vulnerability exists in host.php (via tree.php) in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname field for Devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20726/">CVE-2018-20726</cve>
	<bugzilla href="https://bugzilla.suse.com/1122242">SUSE bug 1122242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20743</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20743" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20743" ref_url="https://www.suse.com/security/cve/CVE-2018-20743" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1794-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00058.html" source="SUSE-SU"/>
    <description>
    murmur in Mumble through 1.2.19 before 2018-08-31 mishandles multiple concurrent requests that are persisted in the database, which allows remote attackers to cause a denial of service (daemon hang or crash) via a message flood.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-20743/">CVE-2018-20743</cve>
	<bugzilla href="https://bugzilla.suse.com/1123334">SUSE bug 1123334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609721" comment="mumble-1.2.19-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260552" comment="mumble is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009509750" comment="mumble-32bit-1.2.19-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260554" comment="mumble-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609722" comment="mumble-server-1.2.19-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260556" comment="mumble-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20783</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20783" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783</cve>
	<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127122">SUSE bug 1127122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20821</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20821" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20821" ref_url="https://www.suse.com/security/cve/CVE-2018-20821" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    The parsing component in LibSass through 3.5.5 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Parser::parse_css_variable_value in parser.cpp).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-20821/">CVE-2018-20821</cve>
	<bugzilla href="https://bugzilla.suse.com/1133200">SUSE bug 1133200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20822</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20822" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20822" ref_url="https://www.suse.com/security/cve/CVE-2018-20822" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-20822/">CVE-2018-20822</cve>
	<bugzilla href="https://bugzilla.suse.com/1133201">SUSE bug 1133201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20836</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601814" comment="kernel-debug-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601815" comment="kernel-debug-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601816" comment="kernel-debug-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601817" comment="kernel-default-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601818" comment="kernel-default-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601819" comment="kernel-default-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601820" comment="kernel-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601821" comment="kernel-docs-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601822" comment="kernel-docs-html-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601823" comment="kernel-kvmsmall-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601824" comment="kernel-kvmsmall-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601825" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601826" comment="kernel-macros-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601827" comment="kernel-obs-build-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601828" comment="kernel-obs-qa-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601829" comment="kernel-source-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601830" comment="kernel-source-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601831" comment="kernel-syms-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601832" comment="kernel-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601833" comment="kernel-vanilla-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601834" comment="kernel-vanilla-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20843</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00104.html" source="SUSE-SU"/>
    <description>
    In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843</cve>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601879" comment="expat-2.2.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601880" comment="libexpat-devel-2.2.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601881" comment="libexpat-devel-32bit-2.2.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151785" comment="libexpat-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601882" comment="libexpat1-2.2.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601883" comment="libexpat1-32bit-2.2.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20852</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602507" comment="libpython2_7-1_0-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602508" comment="libpython2_7-1_0-32bit-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602509" comment="python-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602510" comment="python-32bit-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602511" comment="python-base-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602512" comment="python-base-32bit-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602513" comment="python-curses-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602514" comment="python-demo-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602515" comment="python-devel-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602516" comment="python-doc-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602517" comment="python-doc-pdf-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602518" comment="python-gdbm-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602519" comment="python-idle-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602520" comment="python-tk-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602521" comment="python-xml-2.7.14-lp151.10.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20855</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20855" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602144" comment="kernel-debug-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602145" comment="kernel-debug-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602146" comment="kernel-debug-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602147" comment="kernel-default-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602148" comment="kernel-default-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602149" comment="kernel-default-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602150" comment="kernel-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602151" comment="kernel-docs-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602152" comment="kernel-docs-html-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602153" comment="kernel-kvmsmall-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602154" comment="kernel-kvmsmall-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602155" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602156" comment="kernel-macros-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602157" comment="kernel-obs-build-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602158" comment="kernel-obs-qa-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602159" comment="kernel-source-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602160" comment="kernel-source-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602161" comment="kernel-syms-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602162" comment="kernel-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602163" comment="kernel-vanilla-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602164" comment="kernel-vanilla-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20860</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20860" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20860" ref_url="https://www.suse.com/security/cve/CVE-2018-20860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005954.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html" source="SUSE-SU"/>
    <description>
    libopenmpt before 0.3.13 allows a crash with malformed MED files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20860/">CVE-2018-20860</cve>
	<bugzilla href="https://bugzilla.suse.com/1143581">SUSE bug 1143581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603073" comment="libmodplug-devel-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230500" comment="libmodplug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603074" comment="libmodplug1-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151586" comment="libmodplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603075" comment="libmodplug1-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230501" comment="libmodplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603076" comment="libopenmpt-devel-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230503" comment="libopenmpt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603077" comment="libopenmpt0-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230504" comment="libopenmpt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603078" comment="libopenmpt0-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230505" comment="libopenmpt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603079" comment="libopenmpt_modplug1-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230506" comment="libopenmpt_modplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603080" comment="libopenmpt_modplug1-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230507" comment="libopenmpt_modplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603081" comment="openmpt123-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230508" comment="openmpt123 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20861</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20861" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20861" ref_url="https://www.suse.com/security/cve/CVE-2018-20861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005954.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html" source="SUSE-SU"/>
    <description>
    libopenmpt before 0.3.11 allows a crash with certain malformed custom tunings in MPTM files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20861/">CVE-2018-20861</cve>
	<bugzilla href="https://bugzilla.suse.com/1143578">SUSE bug 1143578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603073" comment="libmodplug-devel-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230500" comment="libmodplug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603074" comment="libmodplug1-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151586" comment="libmodplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603075" comment="libmodplug1-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230501" comment="libmodplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603076" comment="libopenmpt-devel-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230503" comment="libopenmpt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603077" comment="libopenmpt0-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230504" comment="libopenmpt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603078" comment="libopenmpt0-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230505" comment="libopenmpt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603079" comment="libopenmpt_modplug1-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230506" comment="libopenmpt_modplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603080" comment="libopenmpt_modplug1-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230507" comment="libopenmpt_modplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603081" comment="openmpt123-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230508" comment="openmpt123 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20976</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21008" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21247</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3288</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3288" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3288" ref_url="https://www.suse.com/security/cve/CVE-2018-3288" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3288/">CVE-2018-3288</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3289</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3289" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3289" ref_url="https://www.suse.com/security/cve/CVE-2018-3289" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3289/">CVE-2018-3289</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3290</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3290" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3290" ref_url="https://www.suse.com/security/cve/CVE-2018-3290" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3290/">CVE-2018-3290</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3291</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3291" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3291" ref_url="https://www.suse.com/security/cve/CVE-2018-3291" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3291/">CVE-2018-3291</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3292</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3292" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3292" ref_url="https://www.suse.com/security/cve/CVE-2018-3292" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3292/">CVE-2018-3292</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3293</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3293" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3293" ref_url="https://www.suse.com/security/cve/CVE-2018-3293" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3293/">CVE-2018-3293</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3294</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3294" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3294" ref_url="https://www.suse.com/security/cve/CVE-2018-3294" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3294/">CVE-2018-3294</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3295</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3295" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3295" ref_url="https://www.suse.com/security/cve/CVE-2018-3295" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3295/">CVE-2018-3295</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3296</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3296" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3296" ref_url="https://www.suse.com/security/cve/CVE-2018-3296" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3296/">CVE-2018-3296</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3297</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3297" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3297" ref_url="https://www.suse.com/security/cve/CVE-2018-3297" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3297/">CVE-2018-3297</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3298</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3298" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3298" ref_url="https://www.suse.com/security/cve/CVE-2018-3298" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3298/">CVE-2018-3298</cve>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3639</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639" source="SUSE CVE"/>
		<reference ref_id="BLOG-SPECTREV4" ref_url="https://www.suse.com/c/suse-addresses-spectre-variant-4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="TID000019189" ref_url="https://www.suse.com/support/kb/doc/?id=000019189" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022937" ref_url="https://www.suse.com/support/kb/doc/?id=7022937" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085235">SUSE bug 1085235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085308">SUSE bug 1085308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102640">SUSE bug 1102640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173489">SUSE bug 1173489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605046" comment="kernel-debug-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605047" comment="kernel-debug-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605048" comment="kernel-debug-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605049" comment="kernel-default-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605050" comment="kernel-default-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605051" comment="kernel-default-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605052" comment="kernel-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605053" comment="kernel-docs-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605054" comment="kernel-docs-html-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605055" comment="kernel-kvmsmall-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605056" comment="kernel-kvmsmall-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605057" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605058" comment="kernel-macros-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605059" comment="kernel-obs-build-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605060" comment="kernel-obs-qa-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605061" comment="kernel-source-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605062" comment="kernel-source-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605063" comment="kernel-syms-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605064" comment="kernel-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605065" comment="kernel-vanilla-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605066" comment="kernel-vanilla-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5388</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101792">SUSE bug 1101792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603817" comment="strongswan-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603818" comment="strongswan-doc-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603819" comment="strongswan-hmac-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153118" comment="strongswan-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603820" comment="strongswan-ipsec-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603821" comment="strongswan-libs0-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153120" comment="strongswan-libs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603822" comment="strongswan-mysql-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603823" comment="strongswan-nm-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603824" comment="strongswan-sqlite-5.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5740</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    "deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0-&gt;9.8.8, 9.9.0-&gt;9.9.13, 9.10.0-&gt;9.10.8, 9.11.0-&gt;9.11.4, 9.12.0-&gt;9.12.2, 9.13.0-&gt;9.13.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601418" comment="bind-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601419" comment="bind-chrootenv-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601420" comment="bind-devel-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601421" comment="bind-devel-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601422" comment="bind-doc-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601423" comment="bind-lwresd-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601424" comment="bind-utils-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601425" comment="libbind9-160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177141" comment="libbind9-160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601426" comment="libbind9-160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256545" comment="libbind9-160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601427" comment="libdns169-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177142" comment="libdns169 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601428" comment="libdns169-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256548" comment="libdns169-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601429" comment="libirs-devel-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601430" comment="libirs160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177143" comment="libirs160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601431" comment="libirs160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256553" comment="libirs160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601432" comment="libisc166-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177144" comment="libisc166 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601433" comment="libisc166-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256556" comment="libisc166-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601434" comment="libisccc160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177145" comment="libisccc160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601435" comment="libisccc160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256559" comment="libisccc160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601436" comment="libisccfg160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177146" comment="libisccfg160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601437" comment="libisccfg160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256562" comment="libisccfg160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601438" comment="liblwres160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177147" comment="liblwres160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601439" comment="liblwres160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256565" comment="liblwres160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601440" comment="python3-bind-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5741</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5741" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5743</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.6, 9.12.0 -&gt; 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -&gt; 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -&gt; 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601418" comment="bind-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601419" comment="bind-chrootenv-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601420" comment="bind-devel-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601421" comment="bind-devel-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601422" comment="bind-doc-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601423" comment="bind-lwresd-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601424" comment="bind-utils-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601425" comment="libbind9-160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177141" comment="libbind9-160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601426" comment="libbind9-160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256545" comment="libbind9-160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601427" comment="libdns169-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177142" comment="libdns169 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601428" comment="libdns169-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256548" comment="libdns169-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601429" comment="libirs-devel-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601430" comment="libirs160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177143" comment="libirs160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601431" comment="libirs160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256553" comment="libirs160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601432" comment="libisc166-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177144" comment="libisc166 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601433" comment="libisc166-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256556" comment="libisc166-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601434" comment="libisccc160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177145" comment="libisccc160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601435" comment="libisccc160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256559" comment="libisccc160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601436" comment="libisccfg160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177146" comment="libisccfg160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601437" comment="libisccfg160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256562" comment="libisccfg160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601438" comment="liblwres160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177147" comment="liblwres160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601439" comment="liblwres160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256565" comment="liblwres160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601440" comment="python3-bind-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5745</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    "managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P1, 9.12.0 -&gt; 9.12.3-P1, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601418" comment="bind-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601419" comment="bind-chrootenv-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601420" comment="bind-devel-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601421" comment="bind-devel-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601422" comment="bind-doc-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601423" comment="bind-lwresd-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601424" comment="bind-utils-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601425" comment="libbind9-160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177141" comment="libbind9-160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601426" comment="libbind9-160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256545" comment="libbind9-160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601427" comment="libdns169-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177142" comment="libdns169 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601428" comment="libdns169-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256548" comment="libdns169-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601429" comment="libirs-devel-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601430" comment="libirs160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177143" comment="libirs160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601431" comment="libirs160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256553" comment="libirs160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601432" comment="libisc166-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177144" comment="libisc166 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601433" comment="libisc166-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256556" comment="libisc166-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601434" comment="libisccc160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177145" comment="libisccc160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601435" comment="libisccc160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256559" comment="libisccc160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601436" comment="libisccfg160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177146" comment="libisccfg160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601437" comment="libisccfg160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256562" comment="libisccfg160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601438" comment="liblwres160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177147" comment="liblwres160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601439" comment="liblwres160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256565" comment="liblwres160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601440" comment="python3-bind-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6323</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6459</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6459" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6459" ref_url="https://www.suse.com/security/cve/CVE-2018-6459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.html" source="SUSE-SU"/>
    <description>
    The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6459/">CVE-2018-6459</cve>
	<bugzilla href="https://bugzilla.suse.com/1079548">SUSE bug 1079548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607311" comment="strongswan-5.8.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607312" comment="strongswan-doc-5.8.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607313" comment="strongswan-hmac-5.8.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153118" comment="strongswan-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607314" comment="strongswan-ipsec-5.8.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607315" comment="strongswan-libs0-5.8.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153120" comment="strongswan-libs0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607316" comment="strongswan-mysql-5.8.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607317" comment="strongswan-nm-5.8.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607318" comment="strongswan-sqlite-5.8.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6543" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6759</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6767" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6767" ref_url="https://www.suse.com/security/cve/CVE-2018-6767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6767/">CVE-2018-6767</cve>
	<bugzilla href="https://bugzilla.suse.com/1079746">SUSE bug 1079746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6872</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6914</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914</cve>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6942</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6942" ref_url="https://www.suse.com/security/cve/CVE-2018-6942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006839.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6942/">CVE-2018-6942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608097" comment="freetype2-devel-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608098" comment="freetype2-devel-32bit-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171242" comment="freetype2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608099" comment="freetype2-profile-tti35-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283722" comment="freetype2-profile-tti35 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608100" comment="ft2demos-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608101" comment="ftbench-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177150" comment="ftbench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608102" comment="ftdiff-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177151" comment="ftdiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608103" comment="ftdump-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177152" comment="ftdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608104" comment="ftgamma-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177153" comment="ftgamma is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608105" comment="ftgrid-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177154" comment="ftgrid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608106" comment="ftinspect-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177155" comment="ftinspect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608107" comment="ftlint-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177156" comment="ftlint is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608108" comment="ftmulti-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177157" comment="ftmulti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608109" comment="ftstring-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177158" comment="ftstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608110" comment="ftvalid-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177159" comment="ftvalid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608111" comment="ftview-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177160" comment="ftview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608112" comment="libfreetype6-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608113" comment="libfreetype6-32bit-2.10.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7191</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7208</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7253</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7253" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253</cve>
	<bugzilla href="https://bugzilla.suse.com/1081692">SUSE bug 1081692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7254</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7254" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254</cve>
	<bugzilla href="https://bugzilla.suse.com/1081693">SUSE bug 1081693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7568</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7569</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7570</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7570" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7642</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128518">SUSE bug 1128518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7643</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8777</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777</cve>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8778</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778</cve>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8779</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779</cve>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8780</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780</cve>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8791</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8791" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8791" ref_url="https://www.suse.com/security/cve/CVE-2018-8791" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8791/">CVE-2018-8791</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8792</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8792" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8792" ref_url="https://www.suse.com/security/cve/CVE-2018-8792" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8792/">CVE-2018-8792</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8793</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8793" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8793" ref_url="https://www.suse.com/security/cve/CVE-2018-8793" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8793/">CVE-2018-8793</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8794</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8794" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8794" ref_url="https://www.suse.com/security/cve/CVE-2018-8794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8794/">CVE-2018-8794</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8795</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8795" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8795" ref_url="https://www.suse.com/security/cve/CVE-2018-8795" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8795/">CVE-2018-8795</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8796</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8796" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8796" ref_url="https://www.suse.com/security/cve/CVE-2018-8796" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_bitmap_updates() that results in a Denial of Service (segfault).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8796/">CVE-2018-8796</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8797" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8797" ref_url="https://www.suse.com/security/cve/CVE-2018-8797" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8797/">CVE-2018-8797</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8798</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8798" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8798" ref_url="https://www.suse.com/security/cve/CVE-2018-8798" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpsnd_process_ping() that results in an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8798/">CVE-2018-8798</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8799</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8799" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8799" ref_url="https://www.suse.com/security/cve/CVE-2018-8799" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8799/">CVE-2018-8799</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8800</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8800" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8800" ref_url="https://www.suse.com/security/cve/CVE-2018-8800" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html" source="SUSE-SU"/>
    <description>
    rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-8800/">CVE-2018-8800</cve>
	<bugzilla href="https://bugzilla.suse.com/1121448">SUSE bug 1121448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609686" comment="rdesktop-1.8.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266803" comment="rdesktop is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8881</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8881" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8881" ref_url="https://www.suse.com/security/cve/CVE-2018-8881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.13.02rc2 has a heap-based buffer over-read in the function tokenize in asm/preproc.c, related to an unterminated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8881/">CVE-2018-8881</cve>
	<bugzilla href="https://bugzilla.suse.com/1086228">SUSE bug 1086228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8882</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8882" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8882" ref_url="https://www.suse.com/security/cve/CVE-2018-8882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.13.02rc2 has a stack-based buffer under-read in the function ieee_shr in asm/float.c via a large shift value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8882/">CVE-2018-8882</cve>
	<bugzilla href="https://bugzilla.suse.com/1086227">SUSE bug 1086227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8883</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8883" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8883" ref_url="https://www.suse.com/security/cve/CVE-2018-8883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Netwide Assembler (NASM) 2.13.02rc2 has a buffer over-read in the parse_line function in asm/parser.c via uncontrolled access to nasm_reg_flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8883/">CVE-2018-8883</cve>
	<bugzilla href="https://bugzilla.suse.com/1086186">SUSE bug 1086186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609190" comment="nasm-2.14.02-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161694" comment="nasm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8945</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8956</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8956" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609184" comment="ntp-4.2.8p15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609185" comment="ntp-doc-4.2.8p15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9154" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1420-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00065.html" source="SUSE-SU"/>
    <description>
    There is a reachable abort in the function jpc_dec_process_sot in libjasper/jpc/jpc_dec.c of JasPer 2.0.14 that will lead to a remote denial of service attack by triggering an unexpected jas_alloc2 return value, a different vulnerability than CVE-2017-13745.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154</cve>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608191" comment="jasper-2.0.14-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608192" comment="libjasper-devel-2.0.14-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608193" comment="libjasper4-2.0.14-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608194" comment="libjasper4-32bit-2.0.14-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9252</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9252" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.14 allows denial of service via a reachable assertion in the function jpc_abstorelstepsize in libjasper/jpc/jpc_enc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252</cve>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605393" comment="jasper-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605394" comment="libjasper-devel-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605395" comment="libjasper4-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177124" comment="libjasper4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605396" comment="libjasper4-32bit-2.0.14-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252842" comment="libjasper4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9305</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9305" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    In Exiv2 0.26, an out-of-bounds read in IptcData::printStructure in iptc.c could result in a crash or information leak, related to the "== 0x1c" case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305</cve>
	<bugzilla href="https://bugzilla.suse.com/1088424">SUSE bug 1088424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0154" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603643" comment="kernel-debug-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603644" comment="kernel-debug-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603645" comment="kernel-debug-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603646" comment="kernel-default-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603647" comment="kernel-default-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603648" comment="kernel-default-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603649" comment="kernel-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603650" comment="kernel-docs-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603651" comment="kernel-docs-html-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603652" comment="kernel-kvmsmall-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603653" comment="kernel-kvmsmall-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603654" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603655" comment="kernel-macros-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603656" comment="kernel-obs-build-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603657" comment="kernel-obs-qa-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603658" comment="kernel-source-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603659" comment="kernel-source-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603660" comment="kernel-syms-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603661" comment="kernel-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603662" comment="kernel-vanilla-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603663" comment="kernel-vanilla-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0155</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603643" comment="kernel-debug-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603644" comment="kernel-debug-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603645" comment="kernel-debug-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603646" comment="kernel-default-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603647" comment="kernel-default-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603648" comment="kernel-default-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603649" comment="kernel-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603650" comment="kernel-docs-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603651" comment="kernel-docs-html-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603652" comment="kernel-kvmsmall-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603653" comment="kernel-kvmsmall-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603654" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603655" comment="kernel-macros-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603656" comment="kernel-obs-build-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603657" comment="kernel-obs-qa-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603658" comment="kernel-source-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603659" comment="kernel-source-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603660" comment="kernel-syms-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603661" comment="kernel-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603662" comment="kernel-vanilla-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603663" comment="kernel-vanilla-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0199</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0199" ref_url="https://www.suse.com/security/cve/CVE-2019-0199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1673-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1808-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html" source="SUSE-SU"/>
    <description>
    The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0199/">CVE-2019-0199</cve>
	<bugzilla href="https://bugzilla.suse.com/1131055">SUSE bug 1131055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139924">SUSE bug 1139924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601990" comment="tomcat-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601991" comment="tomcat-admin-webapps-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601992" comment="tomcat-docs-webapp-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601993" comment="tomcat-el-3_0-api-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601994" comment="tomcat-embed-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601995" comment="tomcat-javadoc-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601996" comment="tomcat-jsp-2_3-api-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601997" comment="tomcat-jsvc-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601998" comment="tomcat-lib-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601999" comment="tomcat-servlet-4_0-api-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602000" comment="tomcat-webapps-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0203</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0203" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0203" ref_url="https://www.suse.com/security/cve/CVE-2019-0203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00051.html" source="SUSE-SU"/>
    <description>
    In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0203/">CVE-2019-0203</cve>
	<bugzilla href="https://bugzilla.suse.com/1142721">SUSE bug 1142721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602090" comment="libsvn_auth_gnome_keyring-1-0-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152695" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602091" comment="libsvn_auth_kwallet-1-0-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152696" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602092" comment="subversion-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151320" comment="subversion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602093" comment="subversion-bash-completion-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152697" comment="subversion-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602094" comment="subversion-devel-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151321" comment="subversion-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602095" comment="subversion-perl-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151322" comment="subversion-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602096" comment="subversion-python-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151323" comment="subversion-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602097" comment="subversion-python-ctypes-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154271" comment="subversion-python-ctypes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602098" comment="subversion-ruby-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152698" comment="subversion-ruby is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602099" comment="subversion-server-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151324" comment="subversion-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602100" comment="subversion-tools-1.10.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151325" comment="subversion-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0221</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1673-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1808-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html" source="SUSE-SU"/>
    <description>
    The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601990" comment="tomcat-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601991" comment="tomcat-admin-webapps-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601992" comment="tomcat-docs-webapp-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601993" comment="tomcat-el-3_0-api-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601994" comment="tomcat-embed-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601995" comment="tomcat-javadoc-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601996" comment="tomcat-jsp-2_3-api-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601997" comment="tomcat-jsvc-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601998" comment="tomcat-lib-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601999" comment="tomcat-servlet-4_0-api-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602000" comment="tomcat-webapps-9.0.21-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0804</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0804" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0804" ref_url="https://www.suse.com/security/cve/CVE-2019-0804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00037.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability exists in the way Azure WaLinuxAgent creates swap files on resource disks, aka 'Azure Linux Agent Information Disclosure Vulnerability'.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0804/">CVE-2019-0804</cve>
	<bugzilla href="https://bugzilla.suse.com/1127838">SUSE bug 1127838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152980">SUSE bug 1152980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606959" comment="python-azure-agent-2.2.45-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009246903" comment="python-azure-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606960" comment="python-azure-agent-test-2.2.45-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009246904" comment="python-azure-agent-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0816</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0816" ref_url="https://www.suse.com/security/cve/CVE-2019-0816" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3097-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193097-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00018.html" source="SUSE-SU"/>
    <description>
    A security feature bypass exists in Azure SSH Keypairs, due to a change in the provisioning logic for some Linux images that use cloud-init, aka 'Azure SSH Keypairs Security Feature Bypass Vulnerability'.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-0816/">CVE-2019-0816</cve>
	<bugzilla href="https://bugzilla.suse.com/1129124">SUSE bug 1129124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603864" comment="cloud-init-19.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273021" comment="cloud-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603865" comment="cloud-init-config-suse-19.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273022" comment="cloud-init-config-suse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603866" comment="cloud-init-doc-19.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273023" comment="cloud-init-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191000019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1000019</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1000019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000019" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019</cve>
	<bugzilla href="https://bugzilla.suse.com/1124341">SUSE bug 1124341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603860" comment="bsdtar-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603861" comment="libarchive-devel-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603862" comment="libarchive13-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603863" comment="libarchive13-32bit-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191000020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1000020</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1000020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000020" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020</cve>
	<bugzilla href="https://bugzilla.suse.com/1124342">SUSE bug 1124342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603860" comment="bsdtar-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603861" comment="libarchive-devel-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603862" comment="libarchive13-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603863" comment="libarchive13-32bit-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10067</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10067" ref_url="https://www.suse.com/security/cve/CVE-2019-10067" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6 and Community Edition 5.0.x through 5.0.35 and 6.0.x through 6.0.17. An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context of OTRS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-10067/">CVE-2019-10067</cve>
	<bugzilla href="https://bugzilla.suse.com/1133754">SUSE bug 1133754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139406">SUSE bug 1139406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10072</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10072" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10072" ref_url="https://www.suse.com/security/cve/CVE-2019-10072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0226-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html" source="SUSE-SU"/>
    <description>
    The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10072/">CVE-2019-10072</cve>
	<bugzilla href="https://bugzilla.suse.com/1139924">SUSE bug 1139924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607241" comment="tomcat-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607242" comment="tomcat-admin-webapps-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607243" comment="tomcat-docs-webapp-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607244" comment="tomcat-el-3_0-api-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607245" comment="tomcat-embed-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607246" comment="tomcat-javadoc-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607247" comment="tomcat-jsp-2_3-api-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607248" comment="tomcat-jsvc-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607249" comment="tomcat-lib-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607250" comment="tomcat-servlet-4_0-api-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607251" comment="tomcat-webapps-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10081</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10081" ref_url="https://www.suse.com/security/cve/CVE-2019-10081" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
    <description>
    HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10081/">CVE-2019-10081</cve>
	<bugzilla href="https://bugzilla.suse.com/1145742">SUSE bug 1145742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602583" comment="apache2-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602584" comment="apache2-devel-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602585" comment="apache2-doc-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602586" comment="apache2-event-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602587" comment="apache2-example-pages-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602588" comment="apache2-prefork-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602589" comment="apache2-utils-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602590" comment="apache2-worker-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10082</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10082" ref_url="https://www.suse.com/security/cve/CVE-2019-10082" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10082/">CVE-2019-10082</cve>
	<bugzilla href="https://bugzilla.suse.com/1145741">SUSE bug 1145741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602583" comment="apache2-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602584" comment="apache2-devel-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602585" comment="apache2-doc-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602586" comment="apache2-event-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602587" comment="apache2-example-pages-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602588" comment="apache2-prefork-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602589" comment="apache2-utils-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602590" comment="apache2-worker-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10086</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10086" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10086" ref_url="https://www.suse.com/security/cve/CVE-2019-10086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html" source="SUSE-SU"/>
    <description>
    In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10086/">CVE-2019-10086</cve>
	<bugzilla href="https://bugzilla.suse.com/1146657">SUSE bug 1146657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602617" comment="apache-commons-beanutils-1.9.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152132" comment="apache-commons-beanutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602618" comment="apache-commons-beanutils-javadoc-1.9.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263520" comment="apache-commons-beanutils-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10092</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092</cve>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182703">SUSE bug 1182703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602583" comment="apache2-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602584" comment="apache2-devel-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602585" comment="apache2-doc-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602586" comment="apache2-event-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602587" comment="apache2-example-pages-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602588" comment="apache2-prefork-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602589" comment="apache2-utils-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602590" comment="apache2-worker-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10097</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10097" ref_url="https://www.suse.com/security/cve/CVE-2019-10097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10097/">CVE-2019-10097</cve>
	<bugzilla href="https://bugzilla.suse.com/1145739">SUSE bug 1145739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602583" comment="apache2-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602584" comment="apache2-devel-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602585" comment="apache2-doc-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602586" comment="apache2-event-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602587" comment="apache2-example-pages-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602588" comment="apache2-prefork-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602589" comment="apache2-utils-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602590" comment="apache2-worker-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10098</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098</cve>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602583" comment="apache2-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602584" comment="apache2-devel-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602585" comment="apache2-doc-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602586" comment="apache2-event-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602587" comment="apache2-example-pages-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602588" comment="apache2-prefork-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602589" comment="apache2-utils-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602590" comment="apache2-worker-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010006</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Evince 3.26.0 is affected by buffer overflow. The impact is: DOS / Possible code execution. The component is: backend/tiff/tiff-document.c. The attack vector is: Victim must open a crafted PDF file. The issue occurs because of an incorrect integer overflow protection mechanism in tiff_document_render and tiff_document_get_thumbnail.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602075" comment="evince-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151448" comment="evince is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602076" comment="evince-devel-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009159434" comment="evince-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602077" comment="evince-lang-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151449" comment="evince-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602078" comment="evince-plugin-comicsdocument-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154092" comment="evince-plugin-comicsdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602079" comment="evince-plugin-djvudocument-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154093" comment="evince-plugin-djvudocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602080" comment="evince-plugin-dvidocument-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154094" comment="evince-plugin-dvidocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602081" comment="evince-plugin-pdfdocument-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154095" comment="evince-plugin-pdfdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602082" comment="evince-plugin-psdocument-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154096" comment="evince-plugin-psdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602083" comment="evince-plugin-tiffdocument-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154097" comment="evince-plugin-tiffdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602084" comment="evince-plugin-xpsdocument-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154098" comment="evince-plugin-xpsdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602085" comment="libevdocument3-4-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151450" comment="libevdocument3-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602086" comment="libevview3-3-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151451" comment="libevview3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602087" comment="nautilus-evince-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151452" comment="nautilus-evince is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602088" comment="typelib-1_0-EvinceDocument-3_0-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151453" comment="typelib-1_0-EvinceDocument-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602089" comment="typelib-1_0-EvinceView-3_0-3.26.0+20180128.1bd86963-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151454" comment="typelib-1_0-EvinceView-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010048</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010048" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010048" ref_url="https://www.suse.com/security/cve/CVE-2019-1010048" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0163-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010048/">CVE-2019-1010048</cve>
	<bugzilla href="https://bugzilla.suse.com/1141777">SUSE bug 1141777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605500" comment="upx-3.96-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165780" comment="upx is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010180</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html" source="SUSE-SU"/>
    <description>
    GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603399" comment="binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603400" comment="binutils-devel-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603401" comment="binutils-devel-32bit-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603402" comment="binutils-gold-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603403" comment="cross-aarch64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603404" comment="cross-arm-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603405" comment="cross-avr-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603406" comment="cross-epiphany-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603407" comment="cross-hppa-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603408" comment="cross-hppa64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603409" comment="cross-i386-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603410" comment="cross-ia64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603411" comment="cross-m68k-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603412" comment="cross-mips-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603413" comment="cross-ppc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603414" comment="cross-ppc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603415" comment="cross-ppc64le-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603416" comment="cross-riscv64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603417" comment="cross-rx-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603418" comment="cross-s390-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603419" comment="cross-s390x-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603420" comment="cross-sparc-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603421" comment="cross-sparc64-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603422" comment="cross-spu-binutils-2.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603622" comment="gdb-8.3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152905" comment="gdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603623" comment="gdb-testresults-8.3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152906" comment="gdb-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603624" comment="gdbserver-8.3.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152907" comment="gdbserver is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010190</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010190" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010190" ref_url="https://www.suse.com/security/cve/CVE-2019-1010190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006689.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00016.html" source="SUSE-SU"/>
    <description>
    mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010190/">CVE-2019-1010190</cve>
	<bugzilla href="https://bugzilla.suse.com/1142770">SUSE bug 1142770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607508" comment="g3utils-1.1.37-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235645" comment="g3utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607509" comment="mgetty-1.1.37-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235646" comment="mgetty is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607510" comment="sendfax-1.1.37-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235647" comment="sendfax is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010220</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010220" ref_url="https://www.suse.com/security/cve/CVE-2019-1010220" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010220/">CVE-2019-1010220</cve>
	<bugzilla href="https://bugzilla.suse.com/1142439">SUSE bug 1142439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010222</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010222" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010222" ref_url="https://www.suse.com/security/cve/CVE-2019-1010222" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1852-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00053.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-19801. Reason: This candidate is a reservation duplicate of CVE-2018-19801. Notes: All CVE users should reference CVE-2018-19801 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1010222/">CVE-2019-1010222</cve>
	<bugzilla href="https://bugzilla.suse.com/1142433">SUSE bug 1142433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604621" comment="aubio-tools-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174088" comment="aubio-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604622" comment="libaubio-devel-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174089" comment="libaubio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604623" comment="libaubio5-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229463" comment="libaubio5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604624" comment="libaubio5-32bit-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229464" comment="libaubio5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604625" comment="python2-aubio-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229466" comment="python2-aubio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604626" comment="python3-aubio-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229467" comment="python3-aubio is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010223</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010223" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010223" ref_url="https://www.suse.com/security/cve/CVE-2019-1010223" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1852-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00053.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-19800. Reason: This candidate is a reservation duplicate of CVE-2018-19800. Notes: All CVE users should reference CVE-2018-19800 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1010223/">CVE-2019-1010223</cve>
	<bugzilla href="https://bugzilla.suse.com/1142436">SUSE bug 1142436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604621" comment="aubio-tools-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174088" comment="aubio-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604622" comment="libaubio-devel-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174089" comment="libaubio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604623" comment="libaubio5-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229463" comment="libaubio5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604624" comment="libaubio5-32bit-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229464" comment="libaubio5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604625" comment="python2-aubio-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229466" comment="python2-aubio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604626" comment="python3-aubio-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229467" comment="python3-aubio is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010224</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010224" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010224" ref_url="https://www.suse.com/security/cve/CVE-2019-1010224" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1852-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00053.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-19802. Reason: This candidate is a reservation duplicate of CVE-2018-19802. Notes: All CVE users should reference CVE-2018-19802 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1010224/">CVE-2019-1010224</cve>
	<bugzilla href="https://bugzilla.suse.com/1142435">SUSE bug 1142435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604621" comment="aubio-tools-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174088" comment="aubio-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604622" comment="libaubio-devel-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174089" comment="libaubio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604623" comment="libaubio5-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229463" comment="libaubio5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604624" comment="libaubio5-32bit-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229464" comment="libaubio5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604625" comment="python2-aubio-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229466" comment="python2-aubio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604626" comment="python3-aubio-0.4.6-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229467" comment="python3-aubio is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010305</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010305" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00068.html" source="SUSE-SU"/>
    <description>
    libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136cfe0d05e5bf5703f3e83c6d955234b4d.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305</cve>
	<bugzilla href="https://bugzilla.suse.com/1141680">SUSE bug 1141680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608213" comment="libmspack-devel-0.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238457" comment="libmspack-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608214" comment="libmspack0-0.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151459" comment="libmspack0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608215" comment="libmspack0-32bit-0.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238458" comment="libmspack0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608216" comment="mspack-tools-0.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247101" comment="mspack-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010319</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010319" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319</cve>
	<bugzilla href="https://bugzilla.suse.com/1141334">SUSE bug 1141334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10124</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10124" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10124" ref_url="https://www.suse.com/security/cve/CVE-2019-10124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10124/">CVE-2019-10124</cve>
	<bugzilla href="https://bugzilla.suse.com/1130699">SUSE bug 1130699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10126</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137944">SUSE bug 1137944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156330">SUSE bug 1156330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601814" comment="kernel-debug-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601815" comment="kernel-debug-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601816" comment="kernel-debug-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601817" comment="kernel-default-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601818" comment="kernel-default-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601819" comment="kernel-default-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601820" comment="kernel-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601821" comment="kernel-docs-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601822" comment="kernel-docs-html-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601823" comment="kernel-kvmsmall-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601824" comment="kernel-kvmsmall-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601825" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601826" comment="kernel-macros-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601827" comment="kernel-obs-build-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601828" comment="kernel-obs-qa-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601829" comment="kernel-source-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601830" comment="kernel-source-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601831" comment="kernel-syms-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601832" comment="kernel-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601833" comment="kernel-vanilla-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601834" comment="kernel-vanilla-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10130</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2012-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192012-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in PostgreSQL versions 11.x up to excluding 11.3, 10.x up to excluding 10.8, 9.6.x up to, excluding 9.6.13, 9.5.x up to, excluding 9.5.17. PostgreSQL maintains column statistics for tables. Certain statistics, such as histograms and lists of most common values, contain values taken from the column. PostgreSQL does not evaluate row security policies before consulting those statistics during query planning; an attacker can exploit this to read the most common values of certain columns. Affected columns are those for which the attacker has SELECT privilege and for which, in an ordinary query, row-level security prunes the set of rows visible to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604860" comment="libecpg6-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601867" comment="libecpg6-32bit-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604861" comment="libpq5-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601869" comment="libpq5-32bit-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604862" comment="postgresql-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604863" comment="postgresql-contrib-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604864" comment="postgresql-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604865" comment="postgresql-docs-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604866" comment="postgresql-llvmjit-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604867" comment="postgresql-plperl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604868" comment="postgresql-plpython-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604869" comment="postgresql-pltcl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604870" comment="postgresql-server-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604871" comment="postgresql-server-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604872" comment="postgresql-test-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604873" comment="postgresql10-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604874" comment="postgresql10-contrib-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604875" comment="postgresql10-devel-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604876" comment="postgresql10-docs-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604877" comment="postgresql10-plperl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604878" comment="postgresql10-plpython-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604879" comment="postgresql10-pltcl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604880" comment="postgresql10-server-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604881" comment="postgresql10-test-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604882" comment="postgresql12-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604883" comment="postgresql12-contrib-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604884" comment="postgresql12-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604885" comment="postgresql12-docs-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604886" comment="postgresql12-llvmjit-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604887" comment="postgresql12-plperl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604888" comment="postgresql12-plpython-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604889" comment="postgresql12-pltcl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604890" comment="postgresql12-server-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604891" comment="postgresql12-server-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604892" comment="postgresql12-test-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604893" comment="postgresql96-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161265" comment="postgresql96 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604894" comment="postgresql96-contrib-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161266" comment="postgresql96-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604895" comment="postgresql96-devel-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161267" comment="postgresql96-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604896" comment="postgresql96-docs-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161268" comment="postgresql96-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604897" comment="postgresql96-plperl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163501" comment="postgresql96-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604898" comment="postgresql96-plpython-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163503" comment="postgresql96-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604899" comment="postgresql96-pltcl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163505" comment="postgresql96-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604900" comment="postgresql96-server-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161269" comment="postgresql96-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604901" comment="postgresql96-test-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163508" comment="postgresql96-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10149</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10149" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10149" ref_url="https://www.suse.com/security/cve/CVE-2019-10149" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
    <description>
    A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-10149/">CVE-2019-10149</cve>
	<bugzilla href="https://bugzilla.suse.com/1136587">SUSE bug 1136587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601408" comment="exim-4.88-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601409" comment="eximon-4.88-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601410" comment="eximstats-html-4.88-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10152</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10152" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005844.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html" source="SUSE-SU"/>
    <description>
    A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152</cve>
	<bugzilla href="https://bugzilla.suse.com/1136974">SUSE bug 1136974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602574" comment="fuse-overlayfs-0.4.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266785" comment="fuse-overlayfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602575" comment="fuse3-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266786" comment="fuse3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602576" comment="fuse3-devel-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266787" comment="fuse3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602577" comment="fuse3-doc-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266788" comment="fuse3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602578" comment="libcontainers-common-20190401-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266789" comment="libcontainers-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602579" comment="libfuse3-3-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266790" comment="libfuse3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602580" comment="podman-1.4.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602581" comment="podman-cni-config-1.4.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602582" comment="slirp4netns-0.3.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266793" comment="slirp4netns is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10153</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10153" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10153" ref_url="https://www.suse.com/security/cve/CVE-2019-10153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00020.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a guest VM's comment or other fields would cause fence_rhevm to exit with an exception. In cluster environments, this could lead to preventing automated recovery or otherwise denying service to clusters of which that VM is a member.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10153/">CVE-2019-10153</cve>
	<bugzilla href="https://bugzilla.suse.com/1137314">SUSE bug 1137314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601679" comment="fence-agents-4.4.0+git.1558595666.5f79f9e9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260147" comment="fence-agents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601680" comment="fence-agents-amt_ws-4.4.0+git.1558595666.5f79f9e9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260148" comment="fence-agents-amt_ws is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601681" comment="fence-agents-devel-4.4.0+git.1558595666.5f79f9e9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260149" comment="fence-agents-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10160</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602056" comment="libpython2_7-1_0-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602057" comment="libpython2_7-1_0-32bit-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602058" comment="python-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602059" comment="python-32bit-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602060" comment="python-base-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602061" comment="python-base-32bit-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602062" comment="python-curses-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602063" comment="python-demo-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602064" comment="python-devel-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602065" comment="python-doc-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602066" comment="python-doc-pdf-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602067" comment="python-gdbm-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602068" comment="python-idle-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602069" comment="python-tk-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602070" comment="python-xml-2.7.14-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10161</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601688" comment="libvirt-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601689" comment="libvirt-admin-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601690" comment="libvirt-bash-completion-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601691" comment="libvirt-client-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601692" comment="libvirt-daemon-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601693" comment="libvirt-daemon-config-network-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601694" comment="libvirt-daemon-config-nwfilter-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601695" comment="libvirt-daemon-driver-interface-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601696" comment="libvirt-daemon-driver-libxl-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601697" comment="libvirt-daemon-driver-lxc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601698" comment="libvirt-daemon-driver-network-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601699" comment="libvirt-daemon-driver-nodedev-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601700" comment="libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601701" comment="libvirt-daemon-driver-qemu-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601702" comment="libvirt-daemon-driver-secret-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601703" comment="libvirt-daemon-driver-storage-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601704" comment="libvirt-daemon-driver-storage-core-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601705" comment="libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601706" comment="libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601707" comment="libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601708" comment="libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601709" comment="libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601710" comment="libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601711" comment="libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601712" comment="libvirt-daemon-hooks-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601713" comment="libvirt-daemon-lxc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601714" comment="libvirt-daemon-qemu-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601715" comment="libvirt-daemon-xen-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601716" comment="libvirt-devel-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601717" comment="libvirt-devel-32bit-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601718" comment="libvirt-doc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601719" comment="libvirt-libs-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601720" comment="libvirt-lock-sanlock-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601721" comment="libvirt-nss-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601722" comment="wireshark-plugin-libvirt-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10162</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10162" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10162" ref_url="https://www.suse.com/security/cve/CVE-2019-10162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1921-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00054.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10162/">CVE-2019-10162</cve>
	<bugzilla href="https://bugzilla.suse.com/1138582">SUSE bug 1138582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609726" comment="pdns-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009562499" comment="pdns-backend-geoip-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167901" comment="pdns-backend-geoip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609727" comment="pdns-backend-godbc-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167902" comment="pdns-backend-godbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609728" comment="pdns-backend-ldap-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609729" comment="pdns-backend-lua-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609730" comment="pdns-backend-mydns-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609731" comment="pdns-backend-mysql-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609732" comment="pdns-backend-postgresql-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609733" comment="pdns-backend-remote-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167903" comment="pdns-backend-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609734" comment="pdns-backend-sqlite3-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10163</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10163" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10163" ref_url="https://www.suse.com/security/cve/CVE-2019-10163" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1921-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00054.html" source="SUSE-SU"/>
    <description>
    A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10163/">CVE-2019-10163</cve>
	<bugzilla href="https://bugzilla.suse.com/1138582">SUSE bug 1138582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609726" comment="pdns-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009562499" comment="pdns-backend-geoip-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167901" comment="pdns-backend-geoip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609727" comment="pdns-backend-godbc-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167902" comment="pdns-backend-godbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609728" comment="pdns-backend-ldap-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609729" comment="pdns-backend-lua-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609730" comment="pdns-backend-mydns-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609731" comment="pdns-backend-mysql-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609732" comment="pdns-backend-postgresql-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609733" comment="pdns-backend-remote-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167903" comment="pdns-backend-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609734" comment="pdns-backend-sqlite3-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1783-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2012-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192012-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00035.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601866" comment="libecpg6-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601867" comment="libecpg6-32bit-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601868" comment="libpq5-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601869" comment="libpq5-32bit-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601870" comment="postgresql10-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601871" comment="postgresql10-contrib-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601872" comment="postgresql10-devel-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601873" comment="postgresql10-docs-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601874" comment="postgresql10-plperl-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601875" comment="postgresql10-plpython-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601876" comment="postgresql10-pltcl-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601877" comment="postgresql10-server-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601878" comment="postgresql10-test-10.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10166</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166</cve>
	<bugzilla href="https://bugzilla.suse.com/1138302">SUSE bug 1138302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601688" comment="libvirt-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601689" comment="libvirt-admin-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601690" comment="libvirt-bash-completion-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601691" comment="libvirt-client-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601692" comment="libvirt-daemon-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601693" comment="libvirt-daemon-config-network-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601694" comment="libvirt-daemon-config-nwfilter-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601695" comment="libvirt-daemon-driver-interface-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601696" comment="libvirt-daemon-driver-libxl-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601697" comment="libvirt-daemon-driver-lxc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601698" comment="libvirt-daemon-driver-network-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601699" comment="libvirt-daemon-driver-nodedev-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601700" comment="libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601701" comment="libvirt-daemon-driver-qemu-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601702" comment="libvirt-daemon-driver-secret-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601703" comment="libvirt-daemon-driver-storage-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601704" comment="libvirt-daemon-driver-storage-core-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601705" comment="libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601706" comment="libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601707" comment="libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601708" comment="libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601709" comment="libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601710" comment="libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601711" comment="libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601712" comment="libvirt-daemon-hooks-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601713" comment="libvirt-daemon-lxc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601714" comment="libvirt-daemon-qemu-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601715" comment="libvirt-daemon-xen-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601716" comment="libvirt-devel-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601717" comment="libvirt-devel-32bit-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601718" comment="libvirt-doc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601719" comment="libvirt-libs-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601720" comment="libvirt-lock-sanlock-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601721" comment="libvirt-nss-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601722" comment="wireshark-plugin-libvirt-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10167</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601688" comment="libvirt-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601689" comment="libvirt-admin-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601690" comment="libvirt-bash-completion-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601691" comment="libvirt-client-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601692" comment="libvirt-daemon-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601693" comment="libvirt-daemon-config-network-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601694" comment="libvirt-daemon-config-nwfilter-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601695" comment="libvirt-daemon-driver-interface-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601696" comment="libvirt-daemon-driver-libxl-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601697" comment="libvirt-daemon-driver-lxc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601698" comment="libvirt-daemon-driver-network-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601699" comment="libvirt-daemon-driver-nodedev-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601700" comment="libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601701" comment="libvirt-daemon-driver-qemu-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601702" comment="libvirt-daemon-driver-secret-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601703" comment="libvirt-daemon-driver-storage-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601704" comment="libvirt-daemon-driver-storage-core-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601705" comment="libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601706" comment="libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601707" comment="libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601708" comment="libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601709" comment="libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601710" comment="libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601711" comment="libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601712" comment="libvirt-daemon-hooks-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601713" comment="libvirt-daemon-lxc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601714" comment="libvirt-daemon-qemu-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601715" comment="libvirt-daemon-xen-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601716" comment="libvirt-devel-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601717" comment="libvirt-devel-32bit-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601718" comment="libvirt-doc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601719" comment="libvirt-libs-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601720" comment="libvirt-lock-sanlock-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601721" comment="libvirt-nss-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601722" comment="wireshark-plugin-libvirt-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10168</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168</cve>
	<bugzilla href="https://bugzilla.suse.com/1138305">SUSE bug 1138305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138582">SUSE bug 1138582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601688" comment="libvirt-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601689" comment="libvirt-admin-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601690" comment="libvirt-bash-completion-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601691" comment="libvirt-client-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601692" comment="libvirt-daemon-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601693" comment="libvirt-daemon-config-network-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601694" comment="libvirt-daemon-config-nwfilter-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601695" comment="libvirt-daemon-driver-interface-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601696" comment="libvirt-daemon-driver-libxl-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601697" comment="libvirt-daemon-driver-lxc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601698" comment="libvirt-daemon-driver-network-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601699" comment="libvirt-daemon-driver-nodedev-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601700" comment="libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601701" comment="libvirt-daemon-driver-qemu-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601702" comment="libvirt-daemon-driver-secret-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601703" comment="libvirt-daemon-driver-storage-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601704" comment="libvirt-daemon-driver-storage-core-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601705" comment="libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601706" comment="libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601707" comment="libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601708" comment="libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601709" comment="libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601710" comment="libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601711" comment="libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601712" comment="libvirt-daemon-hooks-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601713" comment="libvirt-daemon-lxc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601714" comment="libvirt-daemon-qemu-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601715" comment="libvirt-daemon-xen-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601716" comment="libvirt-devel-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601717" comment="libvirt-devel-32bit-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152992" comment="libvirt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601718" comment="libvirt-doc-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601719" comment="libvirt-libs-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601720" comment="libvirt-lock-sanlock-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601721" comment="libvirt-nss-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601722" comment="wireshark-plugin-libvirt-5.1.0-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10197</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197</cve>
	<bugzilla href="https://bugzilla.suse.com/1141267">SUSE bug 1141267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602723" comment="ctdb-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602724" comment="ctdb-pcp-pmda-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602725" comment="ctdb-tests-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602726" comment="libdcerpc-binding0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602727" comment="libdcerpc-binding0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602728" comment="libdcerpc-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602729" comment="libdcerpc-samr-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602730" comment="libdcerpc-samr0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602731" comment="libdcerpc-samr0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602732" comment="libdcerpc0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602733" comment="libdcerpc0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602734" comment="libndr-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602735" comment="libndr-krb5pac-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602736" comment="libndr-krb5pac0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602737" comment="libndr-krb5pac0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602738" comment="libndr-nbt-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602739" comment="libndr-nbt0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602740" comment="libndr-nbt0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602741" comment="libndr-standard-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602742" comment="libndr-standard0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602743" comment="libndr-standard0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602744" comment="libndr0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602745" comment="libndr0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602746" comment="libnetapi-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602747" comment="libnetapi0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602748" comment="libnetapi0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602749" comment="libsamba-credentials-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602750" comment="libsamba-credentials0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602751" comment="libsamba-credentials0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602752" comment="libsamba-errors-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602753" comment="libsamba-errors0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602754" comment="libsamba-errors0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602755" comment="libsamba-hostconfig-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602756" comment="libsamba-hostconfig0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602757" comment="libsamba-hostconfig0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602758" comment="libsamba-passdb-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602759" comment="libsamba-passdb0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602760" comment="libsamba-passdb0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602761" comment="libsamba-policy-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602762" comment="libsamba-policy-python-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602763" comment="libsamba-policy-python3-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602764" comment="libsamba-policy0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602765" comment="libsamba-policy0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602766" comment="libsamba-policy0-python3-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602767" comment="libsamba-policy0-python3-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602768" comment="libsamba-util-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602769" comment="libsamba-util0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602770" comment="libsamba-util0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602771" comment="libsamdb-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602772" comment="libsamdb0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602773" comment="libsamdb0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602774" comment="libsmbclient-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602775" comment="libsmbclient0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602776" comment="libsmbclient0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602777" comment="libsmbconf-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602778" comment="libsmbconf0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602779" comment="libsmbconf0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602780" comment="libsmbldap-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602781" comment="libsmbldap2-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602782" comment="libsmbldap2-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602783" comment="libtevent-util-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602784" comment="libtevent-util0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602785" comment="libtevent-util0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602786" comment="libwbclient-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602787" comment="libwbclient0-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602788" comment="libwbclient0-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602789" comment="samba-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602790" comment="samba-ad-dc-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602791" comment="samba-ad-dc-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602792" comment="samba-ceph-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602793" comment="samba-client-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602794" comment="samba-client-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602795" comment="samba-core-devel-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602796" comment="samba-doc-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602797" comment="samba-dsdb-modules-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602798" comment="samba-libs-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602799" comment="samba-libs-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602800" comment="samba-libs-python-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602801" comment="samba-libs-python-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602802" comment="samba-libs-python3-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602803" comment="samba-libs-python3-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602804" comment="samba-pidl-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602805" comment="samba-python-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602806" comment="samba-python3-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602807" comment="samba-test-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602808" comment="samba-winbind-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602809" comment="samba-winbind-32bit-4.9.5+git.187.71edee57d5a-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10203</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10203" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10203" ref_url="https://www.suse.com/security/cve/CVE-2019-10203" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1921-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00054.html" source="SUSE-SU"/>
    <description>
    PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10203/">CVE-2019-10203</cve>
	<bugzilla href="https://bugzilla.suse.com/1142810">SUSE bug 1142810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609726" comment="pdns-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009562499" comment="pdns-backend-geoip-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167901" comment="pdns-backend-geoip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609727" comment="pdns-backend-godbc-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167902" comment="pdns-backend-godbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609728" comment="pdns-backend-ldap-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609729" comment="pdns-backend-lua-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609730" comment="pdns-backend-mydns-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609731" comment="pdns-backend-mysql-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609732" comment="pdns-backend-postgresql-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609733" comment="pdns-backend-remote-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167903" comment="pdns-backend-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609734" comment="pdns-backend-sqlite3-4.1.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10206</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10206" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
    <description>
    ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206</cve>
	<bugzilla href="https://bugzilla.suse.com/1142690">SUSE bug 1142690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154232">SUSE bug 1154232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607522" comment="ansible-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607523" comment="ansible-doc-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607524" comment="ansible-test-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10207</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<bugzilla href="https://bugzilla.suse.com/1123959">SUSE bug 1123959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602144" comment="kernel-debug-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602145" comment="kernel-debug-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602146" comment="kernel-debug-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602147" comment="kernel-default-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602148" comment="kernel-default-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602149" comment="kernel-default-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602150" comment="kernel-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602151" comment="kernel-docs-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602152" comment="kernel-docs-html-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602153" comment="kernel-kvmsmall-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602154" comment="kernel-kvmsmall-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602155" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602156" comment="kernel-macros-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602157" comment="kernel-obs-build-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602158" comment="kernel-obs-qa-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602159" comment="kernel-source-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602160" comment="kernel-source-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602161" comment="kernel-syms-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602162" comment="kernel-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602163" comment="kernel-vanilla-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602164" comment="kernel-vanilla-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10208</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in postgresql versions 9.4.x before 9.4.24, 9.5.x before 9.5.19, 9.6.x before 9.6.15, 10.x before 10.10 and 11.x before 11.5 where arbitrary SQL statements can be executed given a suitable SECURITY DEFINER function. An attacker, with EXECUTE permission on the function, can execute arbitrary SQL as the owner of the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604860" comment="libecpg6-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602620" comment="libecpg6-32bit-10.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604861" comment="libpq5-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602622" comment="libpq5-32bit-10.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604862" comment="postgresql-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604863" comment="postgresql-contrib-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604864" comment="postgresql-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604865" comment="postgresql-docs-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604866" comment="postgresql-llvmjit-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604867" comment="postgresql-plperl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604868" comment="postgresql-plpython-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604869" comment="postgresql-pltcl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604870" comment="postgresql-server-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604871" comment="postgresql-server-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604872" comment="postgresql-test-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604873" comment="postgresql10-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604874" comment="postgresql10-contrib-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604875" comment="postgresql10-devel-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604876" comment="postgresql10-docs-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604877" comment="postgresql10-plperl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604878" comment="postgresql10-plpython-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604879" comment="postgresql10-pltcl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604880" comment="postgresql10-server-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604881" comment="postgresql10-test-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604882" comment="postgresql12-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604883" comment="postgresql12-contrib-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604884" comment="postgresql12-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604885" comment="postgresql12-docs-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604886" comment="postgresql12-llvmjit-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604887" comment="postgresql12-plperl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604888" comment="postgresql12-plpython-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604889" comment="postgresql12-pltcl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604890" comment="postgresql12-server-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604891" comment="postgresql12-server-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604892" comment="postgresql12-test-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604893" comment="postgresql96-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161265" comment="postgresql96 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604894" comment="postgresql96-contrib-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161266" comment="postgresql96-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604895" comment="postgresql96-devel-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161267" comment="postgresql96-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604896" comment="postgresql96-docs-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161268" comment="postgresql96-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604897" comment="postgresql96-plperl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163501" comment="postgresql96-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604898" comment="postgresql96-plpython-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163503" comment="postgresql96-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604899" comment="postgresql96-pltcl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163505" comment="postgresql96-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604900" comment="postgresql96-server-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161269" comment="postgresql96-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604901" comment="postgresql96-test-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163508" comment="postgresql96-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10214</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2368-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192368-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7YYGMTZ4T4RLHDVCMQD3K6CDIAXO3O3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P4DQSPUPKAZCPS5MQYTAYGS7YM76UIHZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFIDXN6UAK2I4PPVFPBE4STNQH2FZQ4A/" source="SUSE-SU"/>
    <description>
    The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-10"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214</cve>
	<bugzilla href="https://bugzilla.suse.com/1144065">SUSE bug 1144065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606505" comment="buildah-1.17.0-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266828" comment="buildah is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607614" comment="cri-o-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281964" comment="cri-o is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607615" comment="cri-o-kubeadm-criconfig-1.17.1-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281965" comment="cri-o-kubeadm-criconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607616" comment="cri-tools-1.18.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281966" comment="cri-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607617" comment="go1.14-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607618" comment="go1.14-doc-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607619" comment="go1.14-race-1.14-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607620" comment="kubernetes-apiserver-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281971" comment="kubernetes-apiserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607621" comment="kubernetes-client-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281972" comment="kubernetes-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607622" comment="kubernetes-controller-manager-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281973" comment="kubernetes-controller-manager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607623" comment="kubernetes-kubeadm-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281974" comment="kubernetes-kubeadm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607624" comment="kubernetes-kubelet-common-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281975" comment="kubernetes-kubelet-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607625" comment="kubernetes-kubelet1.17-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281976" comment="kubernetes-kubelet1.17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607626" comment="kubernetes-kubelet1.18-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281977" comment="kubernetes-kubelet1.18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607627" comment="kubernetes-master-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281978" comment="kubernetes-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607628" comment="kubernetes-node-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281979" comment="kubernetes-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607629" comment="kubernetes-proxy-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281980" comment="kubernetes-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607630" comment="kubernetes-scheduler-1.18.0-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281981" comment="kubernetes-scheduler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602810" comment="podman-1.4.4-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602811" comment="podman-cni-config-1.4.4-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607232" comment="skopeo-0.1.41-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265412" comment="skopeo is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10216</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005903.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00062.html" source="SUSE-SU"/>
    <description>
    In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216</cve>
	<bugzilla href="https://bugzilla.suse.com/1144621">SUSE bug 1144621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602718" comment="ghostscript-9.26a-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602719" comment="ghostscript-devel-9.26a-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602720" comment="ghostscript-mini-9.26a-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602721" comment="ghostscript-mini-devel-9.26a-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602722" comment="ghostscript-x11-9.26a-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10217</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
    <description>
    A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217</cve>
	<bugzilla href="https://bugzilla.suse.com/1144453">SUSE bug 1144453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607522" comment="ansible-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607523" comment="ansible-doc-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607524" comment="ansible-test-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10218</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2866-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192866-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2868-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192868-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2875-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192875-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603497" comment="ctdb-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603498" comment="ctdb-pcp-pmda-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603499" comment="ctdb-tests-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603500" comment="libdcerpc-binding0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603501" comment="libdcerpc-binding0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603502" comment="libdcerpc-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603503" comment="libdcerpc-samr-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603504" comment="libdcerpc-samr0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603505" comment="libdcerpc-samr0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603506" comment="libdcerpc0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603507" comment="libdcerpc0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603508" comment="libndr-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603509" comment="libndr-krb5pac-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603510" comment="libndr-krb5pac0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603511" comment="libndr-krb5pac0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603512" comment="libndr-nbt-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603513" comment="libndr-nbt0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603514" comment="libndr-nbt0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603515" comment="libndr-standard-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603516" comment="libndr-standard0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603517" comment="libndr-standard0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603518" comment="libndr0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603519" comment="libndr0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603520" comment="libnetapi-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603521" comment="libnetapi0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603522" comment="libnetapi0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603523" comment="libsamba-credentials-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603524" comment="libsamba-credentials0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603525" comment="libsamba-credentials0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603526" comment="libsamba-errors-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603527" comment="libsamba-errors0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603528" comment="libsamba-errors0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603529" comment="libsamba-hostconfig-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603530" comment="libsamba-hostconfig0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603531" comment="libsamba-hostconfig0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603532" comment="libsamba-passdb-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603533" comment="libsamba-passdb0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603534" comment="libsamba-passdb0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603535" comment="libsamba-policy-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603536" comment="libsamba-policy-python-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603537" comment="libsamba-policy-python3-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603538" comment="libsamba-policy0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603539" comment="libsamba-policy0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603540" comment="libsamba-policy0-python3-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603541" comment="libsamba-policy0-python3-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603542" comment="libsamba-util-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603543" comment="libsamba-util0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603544" comment="libsamba-util0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603545" comment="libsamdb-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603546" comment="libsamdb0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603547" comment="libsamdb0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603548" comment="libsmbclient-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603549" comment="libsmbclient0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603550" comment="libsmbclient0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603551" comment="libsmbconf-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603552" comment="libsmbconf0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603553" comment="libsmbconf0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603554" comment="libsmbldap-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603555" comment="libsmbldap2-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603556" comment="libsmbldap2-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603557" comment="libtevent-util-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603558" comment="libtevent-util0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603559" comment="libtevent-util0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603560" comment="libwbclient-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603561" comment="libwbclient0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603562" comment="libwbclient0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603563" comment="samba-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603564" comment="samba-ad-dc-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603565" comment="samba-ad-dc-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603566" comment="samba-ceph-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603567" comment="samba-client-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603568" comment="samba-client-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603569" comment="samba-core-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603570" comment="samba-doc-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603571" comment="samba-dsdb-modules-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603572" comment="samba-libs-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603573" comment="samba-libs-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603574" comment="samba-libs-python-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603575" comment="samba-libs-python-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603576" comment="samba-libs-python3-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603577" comment="samba-libs-python3-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603578" comment="samba-pidl-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603579" comment="samba-python-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603580" comment="samba-python3-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603581" comment="samba-test-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603582" comment="samba-winbind-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603583" comment="samba-winbind-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10220</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2859-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3019-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193019-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603643" comment="kernel-debug-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603644" comment="kernel-debug-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603645" comment="kernel-debug-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603646" comment="kernel-default-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603647" comment="kernel-default-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603648" comment="kernel-default-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603649" comment="kernel-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603650" comment="kernel-docs-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603651" comment="kernel-docs-html-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603652" comment="kernel-kvmsmall-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603653" comment="kernel-kvmsmall-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603654" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603655" comment="kernel-macros-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603656" comment="kernel-obs-build-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603657" comment="kernel-obs-qa-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603658" comment="kernel-source-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603659" comment="kernel-source-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603660" comment="kernel-syms-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603661" comment="kernel-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603662" comment="kernel-vanilla-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603663" comment="kernel-vanilla-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10638</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601814" comment="kernel-debug-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601815" comment="kernel-debug-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601816" comment="kernel-debug-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601817" comment="kernel-default-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601818" comment="kernel-default-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601819" comment="kernel-default-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601820" comment="kernel-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601821" comment="kernel-docs-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601822" comment="kernel-docs-html-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601823" comment="kernel-kvmsmall-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601824" comment="kernel-kvmsmall-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601825" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601826" comment="kernel-macros-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601827" comment="kernel-obs-build-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601828" comment="kernel-obs-qa-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601829" comment="kernel-source-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601830" comment="kernel-source-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601831" comment="kernel-syms-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601832" comment="kernel-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601833" comment="kernel-vanilla-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601834" comment="kernel-vanilla-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10639</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601814" comment="kernel-debug-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601815" comment="kernel-debug-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601816" comment="kernel-debug-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601817" comment="kernel-default-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601818" comment="kernel-default-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601819" comment="kernel-default-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601820" comment="kernel-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601821" comment="kernel-docs-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601822" comment="kernel-docs-html-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601823" comment="kernel-kvmsmall-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601824" comment="kernel-kvmsmall-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601825" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601826" comment="kernel-macros-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601827" comment="kernel-obs-build-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601828" comment="kernel-obs-qa-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601829" comment="kernel-source-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601830" comment="kernel-source-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601831" comment="kernel-syms-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601832" comment="kernel-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601833" comment="kernel-vanilla-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601834" comment="kernel-vanilla-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10732</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10732" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10732" ref_url="https://www.suse.com/security/cve/CVE-2019-10732" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIP7JD6E7AKTOSG2IAFVY4AE7G4NZIKB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0227-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLC7UQIBHAGRFRPYNNT4MHJGHGZKGOLU/" source="SUSE-SU"/>
    <description>
    In KDE KMail 5.2.3, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10732/">CVE-2019-10732</cve>
	<bugzilla href="https://bugzilla.suse.com/1131885">SUSE bug 1131885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609468" comment="messagelib-18.12.3-lp151.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157848" comment="messagelib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609469" comment="messagelib-devel-18.12.3-lp151.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157849" comment="messagelib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609470" comment="messagelib-lang-18.12.3-lp151.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241457" comment="messagelib-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10740</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10740" ref_url="https://www.suse.com/security/cve/CVE-2019-10740" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10740/">CVE-2019-10740</cve>
	<bugzilla href="https://bugzilla.suse.com/1131801">SUSE bug 1131801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609735" comment="roundcubemail-1.3.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10751" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10751" ref_url="https://www.suse.com/security/cve/CVE-2019-10751" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00022.html" source="SUSE-SU"/>
    <description>
    All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10751/">CVE-2019-10751</cve>
	<bugzilla href="https://bugzilla.suse.com/1148466">SUSE bug 1148466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609736" comment="python3-httpie-1.0.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266830" comment="python3-httpie is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10877</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10877" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10877" ref_url="https://www.suse.com/security/cve/CVE-2019-10877" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00077.html" source="SUSE-SU"/>
    <description>
    In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10877/">CVE-2019-10877</cve>
	<bugzilla href="https://bugzilla.suse.com/1131731">SUSE bug 1131731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601972" comment="teeworlds-0.7.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266800" comment="teeworlds is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10878</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10878" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10878" ref_url="https://www.suse.com/security/cve/CVE-2019-10878" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00077.html" source="SUSE-SU"/>
    <description>
    In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10878/">CVE-2019-10878</cve>
	<bugzilla href="https://bugzilla.suse.com/1131730">SUSE bug 1131730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601972" comment="teeworlds-0.7.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266800" comment="teeworlds is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10879</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10879" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10879" ref_url="https://www.suse.com/security/cve/CVE-2019-10879" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00077.html" source="SUSE-SU"/>
    <description>
    In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp that can lead to a buffer overflow and possibly remote code execution, because size-related multiplications are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10879/">CVE-2019-10879</cve>
	<bugzilla href="https://bugzilla.suse.com/1131729">SUSE bug 1131729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601972" comment="teeworlds-0.7.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266800" comment="teeworlds is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10894</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10894" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the GSS-API dissector could crash. This was addressed in epan/dissectors/packet-gssapi.c by ensuring that a valid dissector is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10895</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10895" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file parser could crash. This was addressed in wiretap/netscaler.c by improving data validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10896</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10896" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DOF dissector could crash. This was addressed in epan/dissectors/packet-dof.c by properly handling generated IID and OID bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10897</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10897" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10897" ref_url="https://www.suse.com/security/cve/CVE-2019-10897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0, the IEEE 802.11 dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-ieee80211.c by detecting cases in which the bit offset does not advance.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10897/">CVE-2019-10897</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10898</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10898" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10898" ref_url="https://www.suse.com/security/cve/CVE-2019-10898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0, the GSUP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gsm_gsup.c by rejecting an invalid Information Element length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10898/">CVE-2019-10898</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10899</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10899" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the SRVLOC dissector could crash. This was addressed in epan/dissectors/packet-srvloc.c by preventing a heap-based buffer under-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10900</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10900" ref_url="https://www.suse.com/security/cve/CVE-2019-10900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0, the Rbm dissector could go into an infinite loop. This was addressed in epan/dissectors/file-rbm.c by handling unknown object types safely.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10900/">CVE-2019-10900</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10901</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10902</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10902" ref_url="https://www.suse.com/security/cve/CVE-2019-10902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0, the TSDNS dissector could crash. This was addressed in epan/dissectors/packet-tsdns.c by splitting strings safely.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10902/">CVE-2019-10902</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10903</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS dissector could crash. This was addressed in epan/dissectors/packet-dcerpc-spoolss.c by adding a boundary check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903</cve>
	<bugzilla href="https://bugzilla.suse.com/1131941">SUSE bug 1131941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131943">SUSE bug 1131943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131945">SUSE bug 1131945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11023" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1267-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1267-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00065.html" source="SUSE-SU"/>
    <description>
    The agroot() function in cgraph\obj.c in libcgraph.a in Graphviz 2.39.20160612.1140 has a NULL pointer dereference, as demonstrated by graphml2gv.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<bugzilla href="https://bugzilla.suse.com/1132091">SUSE bug 1132091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601289" comment="graphviz-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167847" comment="graphviz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601290" comment="graphviz-devel-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167849" comment="graphviz-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601291" comment="graphviz-doc-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167851" comment="graphviz-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601292" comment="graphviz-gd-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167853" comment="graphviz-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601293" comment="graphviz-gnome-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167855" comment="graphviz-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601294" comment="graphviz-guile-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167857" comment="graphviz-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601295" comment="graphviz-gvedit-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167859" comment="graphviz-gvedit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601296" comment="graphviz-java-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167861" comment="graphviz-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601297" comment="graphviz-lua-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167863" comment="graphviz-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601298" comment="graphviz-perl-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167865" comment="graphviz-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601299" comment="graphviz-php-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167867" comment="graphviz-php is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601300" comment="graphviz-plugins-core-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254560" comment="graphviz-plugins-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601301" comment="graphviz-python-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167871" comment="graphviz-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601302" comment="graphviz-ruby-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167873" comment="graphviz-ruby is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601303" comment="graphviz-smyrna-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167875" comment="graphviz-smyrna is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601304" comment="graphviz-tcl-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167877" comment="graphviz-tcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601305" comment="libgraphviz6-2.40.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009254561" comment="libgraphviz6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11034</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034</cve>
	<bugzilla href="https://bugzilla.suse.com/1132838">SUSE bug 1132838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11035</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035</cve>
	<bugzilla href="https://bugzilla.suse.com/1132837">SUSE bug 1132837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11036</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036</cve>
	<bugzilla href="https://bugzilla.suse.com/1134322">SUSE bug 1134322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11037</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11037" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11037" ref_url="https://www.suse.com/security/cve/CVE-2019-11037" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00016.html" source="SUSE-SU"/>
    <description>
    In PHP imagick extension in versions between 3.3.0 and 3.4.4, writing to an array of values in ImagickKernel::fromMatrix() function did not check that the address will be within the allocated array. This could lead to out of bounds write to memory if the function is called with the data controlled by untrusted party.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11037/">CVE-2019-11037</cve>
	<bugzilla href="https://bugzilla.suse.com/1135418">SUSE bug 1135418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609737" comment="php7-imagick-3.4.4-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275705" comment="php7-imagick is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11038</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0594-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html" source="SUSE-SU"/>
    <description>
    When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140120">SUSE bug 1140120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607038" comment="gd-2.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152100" comment="gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607039" comment="gd-devel-2.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153569" comment="gd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607040" comment="libgd3-2.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177199" comment="libgd3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607041" comment="libgd3-32bit-2.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235644" comment="libgd3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1724-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191724-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00029.html" source="SUSE-SU"/>
    <description>
    Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039</cve>
	<bugzilla href="https://bugzilla.suse.com/1138173">SUSE bug 1138173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601884" comment="apache2-mod_php7-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601885" comment="php7-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601886" comment="php7-bcmath-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601887" comment="php7-bz2-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601888" comment="php7-calendar-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601889" comment="php7-ctype-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601890" comment="php7-curl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601891" comment="php7-dba-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601892" comment="php7-devel-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601893" comment="php7-dom-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601894" comment="php7-embed-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601895" comment="php7-enchant-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601896" comment="php7-exif-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601897" comment="php7-fastcgi-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601898" comment="php7-fileinfo-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601899" comment="php7-firebird-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601900" comment="php7-fpm-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601901" comment="php7-ftp-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601902" comment="php7-gd-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601903" comment="php7-gettext-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601904" comment="php7-gmp-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601905" comment="php7-iconv-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601906" comment="php7-intl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601907" comment="php7-json-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601908" comment="php7-ldap-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601909" comment="php7-mbstring-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601910" comment="php7-mysql-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601911" comment="php7-odbc-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601912" comment="php7-opcache-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601913" comment="php7-openssl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601914" comment="php7-pcntl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601915" comment="php7-pdo-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601916" comment="php7-pear-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601917" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601918" comment="php7-pgsql-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601919" comment="php7-phar-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601920" comment="php7-posix-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601921" comment="php7-readline-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601922" comment="php7-shmop-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601923" comment="php7-snmp-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601924" comment="php7-soap-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601925" comment="php7-sockets-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601926" comment="php7-sodium-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601927" comment="php7-sqlite-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601928" comment="php7-sysvmsg-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601929" comment="php7-sysvsem-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601930" comment="php7-sysvshm-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601931" comment="php7-testresults-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601932" comment="php7-tidy-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601933" comment="php7-tokenizer-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601934" comment="php7-wddx-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601935" comment="php7-xmlreader-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601936" comment="php7-xmlrpc-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601937" comment="php7-xmlwriter-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601938" comment="php7-xsl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601939" comment="php7-zip-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601940" comment="php7-zlib-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11040</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1724-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191724-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00029.html" source="SUSE-SU"/>
    <description>
    When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040</cve>
	<bugzilla href="https://bugzilla.suse.com/1138172">SUSE bug 1138172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601884" comment="apache2-mod_php7-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601885" comment="php7-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601886" comment="php7-bcmath-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601887" comment="php7-bz2-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601888" comment="php7-calendar-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601889" comment="php7-ctype-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601890" comment="php7-curl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601891" comment="php7-dba-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601892" comment="php7-devel-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601893" comment="php7-dom-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601894" comment="php7-embed-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601895" comment="php7-enchant-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601896" comment="php7-exif-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601897" comment="php7-fastcgi-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601898" comment="php7-fileinfo-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601899" comment="php7-firebird-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601900" comment="php7-fpm-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601901" comment="php7-ftp-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601902" comment="php7-gd-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601903" comment="php7-gettext-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601904" comment="php7-gmp-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601905" comment="php7-iconv-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601906" comment="php7-intl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601907" comment="php7-json-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601908" comment="php7-ldap-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601909" comment="php7-mbstring-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601910" comment="php7-mysql-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601911" comment="php7-odbc-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601912" comment="php7-opcache-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601913" comment="php7-openssl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601914" comment="php7-pcntl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601915" comment="php7-pdo-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601916" comment="php7-pear-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601917" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601918" comment="php7-pgsql-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601919" comment="php7-phar-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601920" comment="php7-posix-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601921" comment="php7-readline-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601922" comment="php7-shmop-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601923" comment="php7-snmp-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601924" comment="php7-soap-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601925" comment="php7-sockets-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601926" comment="php7-sodium-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601927" comment="php7-sqlite-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601928" comment="php7-sysvmsg-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601929" comment="php7-sysvsem-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601930" comment="php7-sysvshm-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601931" comment="php7-testresults-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601932" comment="php7-tidy-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601933" comment="php7-tokenizer-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601934" comment="php7-wddx-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601935" comment="php7-xmlreader-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601936" comment="php7-xmlrpc-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601937" comment="php7-xmlwriter-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601938" comment="php7-xsl-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601939" comment="php7-zip-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601940" comment="php7-zlib-7.2.5-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11041</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html" source="SUSE-SU"/>
    <description>
    When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041</cve>
	<bugzilla href="https://bugzilla.suse.com/1146360">SUSE bug 1146360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603177" comment="apache2-mod_php7-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603178" comment="php7-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603179" comment="php7-bcmath-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603180" comment="php7-bz2-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603181" comment="php7-calendar-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603182" comment="php7-ctype-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603183" comment="php7-curl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603184" comment="php7-dba-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603185" comment="php7-devel-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603186" comment="php7-dom-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603187" comment="php7-embed-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603188" comment="php7-enchant-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603189" comment="php7-exif-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603190" comment="php7-fastcgi-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603191" comment="php7-fileinfo-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603192" comment="php7-firebird-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603193" comment="php7-fpm-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603194" comment="php7-ftp-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603195" comment="php7-gd-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603196" comment="php7-gettext-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603197" comment="php7-gmp-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603198" comment="php7-iconv-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603199" comment="php7-intl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603200" comment="php7-json-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603201" comment="php7-ldap-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603202" comment="php7-mbstring-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603203" comment="php7-mysql-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603204" comment="php7-odbc-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603205" comment="php7-opcache-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603206" comment="php7-openssl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603207" comment="php7-pcntl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603208" comment="php7-pdo-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603209" comment="php7-pear-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603210" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603211" comment="php7-pgsql-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603212" comment="php7-phar-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603213" comment="php7-posix-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603214" comment="php7-readline-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603215" comment="php7-shmop-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603216" comment="php7-snmp-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603217" comment="php7-soap-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603218" comment="php7-sockets-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603219" comment="php7-sodium-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603220" comment="php7-sqlite-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603221" comment="php7-sysvmsg-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603222" comment="php7-sysvsem-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603223" comment="php7-sysvshm-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603224" comment="php7-tidy-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603225" comment="php7-tokenizer-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603226" comment="php7-wddx-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603227" comment="php7-xmlreader-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603228" comment="php7-xmlrpc-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603229" comment="php7-xmlwriter-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603230" comment="php7-xsl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603231" comment="php7-zip-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603232" comment="php7-zlib-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11042</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00019.html" source="SUSE-SU"/>
    <description>
    When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042</cve>
	<bugzilla href="https://bugzilla.suse.com/1145095">SUSE bug 1145095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603177" comment="apache2-mod_php7-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603178" comment="php7-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603179" comment="php7-bcmath-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603180" comment="php7-bz2-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603181" comment="php7-calendar-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603182" comment="php7-ctype-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603183" comment="php7-curl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603184" comment="php7-dba-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603185" comment="php7-devel-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603186" comment="php7-dom-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603187" comment="php7-embed-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603188" comment="php7-enchant-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603189" comment="php7-exif-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603190" comment="php7-fastcgi-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603191" comment="php7-fileinfo-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603192" comment="php7-firebird-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603193" comment="php7-fpm-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603194" comment="php7-ftp-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603195" comment="php7-gd-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603196" comment="php7-gettext-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603197" comment="php7-gmp-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603198" comment="php7-iconv-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603199" comment="php7-intl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603200" comment="php7-json-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603201" comment="php7-ldap-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603202" comment="php7-mbstring-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603203" comment="php7-mysql-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603204" comment="php7-odbc-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603205" comment="php7-opcache-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603206" comment="php7-openssl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603207" comment="php7-pcntl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603208" comment="php7-pdo-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603209" comment="php7-pear-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603210" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603211" comment="php7-pgsql-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603212" comment="php7-phar-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603213" comment="php7-posix-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603214" comment="php7-readline-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603215" comment="php7-shmop-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603216" comment="php7-snmp-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603217" comment="php7-soap-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603218" comment="php7-sockets-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603219" comment="php7-sodium-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603220" comment="php7-sqlite-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603221" comment="php7-sysvmsg-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603222" comment="php7-sysvsem-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603223" comment="php7-sysvshm-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603224" comment="php7-tidy-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603225" comment="php7-tokenizer-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603226" comment="php7-wddx-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603227" comment="php7-xmlreader-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603228" comment="php7-xmlrpc-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603229" comment="php7-xmlwriter-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603230" comment="php7-xsl-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603231" comment="php7-zip-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603232" comment="php7-zlib-7.2.5-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11043</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2441-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043</cve>
	<bugzilla href="https://bugzilla.suse.com/1154999">SUSE bug 1154999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603440" comment="apache2-mod_php7-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603441" comment="php7-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603442" comment="php7-bcmath-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603443" comment="php7-bz2-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603444" comment="php7-calendar-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603445" comment="php7-ctype-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603446" comment="php7-curl-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603447" comment="php7-dba-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603448" comment="php7-devel-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603449" comment="php7-dom-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603450" comment="php7-embed-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603451" comment="php7-enchant-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603452" comment="php7-exif-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603453" comment="php7-fastcgi-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603454" comment="php7-fileinfo-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603455" comment="php7-firebird-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603456" comment="php7-fpm-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603457" comment="php7-ftp-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603458" comment="php7-gd-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603459" comment="php7-gettext-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603460" comment="php7-gmp-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603461" comment="php7-iconv-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603462" comment="php7-intl-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603463" comment="php7-json-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603464" comment="php7-ldap-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603465" comment="php7-mbstring-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603466" comment="php7-mysql-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603467" comment="php7-odbc-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603468" comment="php7-opcache-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603469" comment="php7-openssl-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603470" comment="php7-pcntl-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603471" comment="php7-pdo-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603472" comment="php7-pear-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603473" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603474" comment="php7-pgsql-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603475" comment="php7-phar-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603476" comment="php7-posix-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603477" comment="php7-readline-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603478" comment="php7-shmop-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603479" comment="php7-snmp-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603480" comment="php7-soap-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603481" comment="php7-sockets-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603482" comment="php7-sodium-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603483" comment="php7-sqlite-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603484" comment="php7-sysvmsg-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603485" comment="php7-sysvsem-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603486" comment="php7-sysvshm-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603487" comment="php7-test-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603488" comment="php7-tidy-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603489" comment="php7-tokenizer-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603490" comment="php7-wddx-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603491" comment="php7-xmlreader-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603492" comment="php7-xmlrpc-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603493" comment="php7-xmlwriter-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603494" comment="php7-xsl-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603495" comment="php7-zip-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603496" comment="php7-zlib-7.2.5-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11045</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11045" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006513.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045</cve>
	<bugzilla href="https://bugzilla.suse.com/1159923">SUSE bug 1159923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608484" comment="apache2-mod_php7-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608485" comment="php7-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608486" comment="php7-bcmath-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608487" comment="php7-bz2-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608488" comment="php7-calendar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608489" comment="php7-ctype-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608490" comment="php7-curl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608491" comment="php7-dba-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608492" comment="php7-devel-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608493" comment="php7-dom-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608494" comment="php7-embed-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608495" comment="php7-enchant-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608496" comment="php7-exif-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608497" comment="php7-fastcgi-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608498" comment="php7-fileinfo-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608499" comment="php7-firebird-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608500" comment="php7-fpm-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608501" comment="php7-ftp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608502" comment="php7-gd-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608503" comment="php7-gettext-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608504" comment="php7-gmp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608505" comment="php7-iconv-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608506" comment="php7-intl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608507" comment="php7-json-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608508" comment="php7-ldap-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608509" comment="php7-mbstring-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608510" comment="php7-mysql-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608511" comment="php7-odbc-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608512" comment="php7-opcache-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608513" comment="php7-openssl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608514" comment="php7-pcntl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608515" comment="php7-pdo-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608516" comment="php7-pear-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608517" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608518" comment="php7-pgsql-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608519" comment="php7-phar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608520" comment="php7-posix-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608521" comment="php7-readline-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608522" comment="php7-shmop-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608523" comment="php7-snmp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608524" comment="php7-soap-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608525" comment="php7-sockets-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608526" comment="php7-sodium-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608527" comment="php7-sqlite-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608528" comment="php7-sysvmsg-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608529" comment="php7-sysvsem-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608530" comment="php7-sysvshm-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608531" comment="php7-test-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608532" comment="php7-tidy-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608533" comment="php7-tokenizer-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608534" comment="php7-wddx-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608535" comment="php7-xmlreader-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608536" comment="php7-xmlrpc-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608537" comment="php7-xmlwriter-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608538" comment="php7-xsl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608539" comment="php7-zip-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608540" comment="php7-zlib-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11046</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11046" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006513.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046</cve>
	<bugzilla href="https://bugzilla.suse.com/1159924">SUSE bug 1159924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608484" comment="apache2-mod_php7-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608485" comment="php7-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608486" comment="php7-bcmath-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608487" comment="php7-bz2-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608488" comment="php7-calendar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608489" comment="php7-ctype-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608490" comment="php7-curl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608491" comment="php7-dba-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608492" comment="php7-devel-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608493" comment="php7-dom-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608494" comment="php7-embed-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608495" comment="php7-enchant-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608496" comment="php7-exif-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608497" comment="php7-fastcgi-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608498" comment="php7-fileinfo-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608499" comment="php7-firebird-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608500" comment="php7-fpm-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608501" comment="php7-ftp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608502" comment="php7-gd-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608503" comment="php7-gettext-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608504" comment="php7-gmp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608505" comment="php7-iconv-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608506" comment="php7-intl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608507" comment="php7-json-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608508" comment="php7-ldap-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608509" comment="php7-mbstring-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608510" comment="php7-mysql-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608511" comment="php7-odbc-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608512" comment="php7-opcache-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608513" comment="php7-openssl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608514" comment="php7-pcntl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608515" comment="php7-pdo-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608516" comment="php7-pear-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608517" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608518" comment="php7-pgsql-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608519" comment="php7-phar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608520" comment="php7-posix-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608521" comment="php7-readline-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608522" comment="php7-shmop-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608523" comment="php7-snmp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608524" comment="php7-soap-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608525" comment="php7-sockets-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608526" comment="php7-sodium-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608527" comment="php7-sqlite-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608528" comment="php7-sysvmsg-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608529" comment="php7-sysvsem-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608530" comment="php7-sysvshm-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608531" comment="php7-test-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608532" comment="php7-tidy-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608533" comment="php7-tokenizer-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608534" comment="php7-wddx-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608535" comment="php7-xmlreader-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608536" comment="php7-xmlrpc-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608537" comment="php7-xmlwriter-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608538" comment="php7-xsl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608539" comment="php7-zip-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608540" comment="php7-zlib-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11047</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11047" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006513.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html" source="SUSE-SU"/>
    <description>
    When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047</cve>
	<bugzilla href="https://bugzilla.suse.com/1159922">SUSE bug 1159922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608484" comment="apache2-mod_php7-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608485" comment="php7-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608486" comment="php7-bcmath-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608487" comment="php7-bz2-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608488" comment="php7-calendar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608489" comment="php7-ctype-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608490" comment="php7-curl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608491" comment="php7-dba-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608492" comment="php7-devel-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608493" comment="php7-dom-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608494" comment="php7-embed-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608495" comment="php7-enchant-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608496" comment="php7-exif-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608497" comment="php7-fastcgi-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608498" comment="php7-fileinfo-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608499" comment="php7-firebird-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608500" comment="php7-fpm-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608501" comment="php7-ftp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608502" comment="php7-gd-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608503" comment="php7-gettext-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608504" comment="php7-gmp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608505" comment="php7-iconv-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608506" comment="php7-intl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608507" comment="php7-json-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608508" comment="php7-ldap-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608509" comment="php7-mbstring-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608510" comment="php7-mysql-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608511" comment="php7-odbc-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608512" comment="php7-opcache-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608513" comment="php7-openssl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608514" comment="php7-pcntl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608515" comment="php7-pdo-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608516" comment="php7-pear-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608517" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608518" comment="php7-pgsql-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608519" comment="php7-phar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608520" comment="php7-posix-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608521" comment="php7-readline-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608522" comment="php7-shmop-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608523" comment="php7-snmp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608524" comment="php7-soap-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608525" comment="php7-sockets-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608526" comment="php7-sodium-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608527" comment="php7-sqlite-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608528" comment="php7-sysvmsg-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608529" comment="php7-sysvsem-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608530" comment="php7-sysvshm-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608531" comment="php7-test-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608532" comment="php7-tidy-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608533" comment="php7-tokenizer-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608534" comment="php7-wddx-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608535" comment="php7-xmlreader-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608536" comment="php7-xmlrpc-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608537" comment="php7-xmlwriter-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608538" comment="php7-xsl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608539" comment="php7-zip-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608540" comment="php7-zlib-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11048</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11048" ref_url="https://www.suse.com/security/cve/CVE-2019-11048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1661-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11048/">CVE-2019-11048</cve>
	<bugzilla href="https://bugzilla.suse.com/1171999">SUSE bug 1171999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608917" comment="apache2-mod_php7-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608918" comment="php7-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608919" comment="php7-bcmath-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608920" comment="php7-bz2-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608921" comment="php7-calendar-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608922" comment="php7-ctype-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608923" comment="php7-curl-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608924" comment="php7-dba-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608925" comment="php7-devel-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608926" comment="php7-dom-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608927" comment="php7-embed-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608928" comment="php7-enchant-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608929" comment="php7-exif-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608930" comment="php7-fastcgi-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608931" comment="php7-fileinfo-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608932" comment="php7-firebird-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608933" comment="php7-fpm-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608934" comment="php7-ftp-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608935" comment="php7-gd-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608936" comment="php7-gettext-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608937" comment="php7-gmp-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608938" comment="php7-iconv-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608939" comment="php7-intl-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608940" comment="php7-json-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608941" comment="php7-ldap-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608942" comment="php7-mbstring-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608943" comment="php7-mysql-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608944" comment="php7-odbc-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608945" comment="php7-opcache-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608946" comment="php7-openssl-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608947" comment="php7-pcntl-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608948" comment="php7-pdo-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608949" comment="php7-pear-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608950" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608951" comment="php7-pgsql-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608952" comment="php7-phar-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608953" comment="php7-posix-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608954" comment="php7-readline-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608955" comment="php7-shmop-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608956" comment="php7-snmp-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608957" comment="php7-soap-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608958" comment="php7-sockets-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608959" comment="php7-sodium-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608960" comment="php7-sqlite-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608961" comment="php7-sysvmsg-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608962" comment="php7-sysvsem-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608963" comment="php7-sysvshm-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608964" comment="php7-test-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608965" comment="php7-tidy-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608966" comment="php7-tokenizer-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608967" comment="php7-wddx-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608968" comment="php7-xmlreader-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608969" comment="php7-xmlrpc-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608970" comment="php7-xmlwriter-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608971" comment="php7-xsl-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608972" comment="php7-zip-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608973" comment="php7-zlib-7.2.5-lp151.6.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11050</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11050" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006513.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html" source="SUSE-SU"/>
    <description>
    When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050</cve>
	<bugzilla href="https://bugzilla.suse.com/1159927">SUSE bug 1159927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608484" comment="apache2-mod_php7-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608485" comment="php7-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608486" comment="php7-bcmath-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608487" comment="php7-bz2-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608488" comment="php7-calendar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608489" comment="php7-ctype-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608490" comment="php7-curl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608491" comment="php7-dba-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608492" comment="php7-devel-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608493" comment="php7-dom-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608494" comment="php7-embed-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608495" comment="php7-enchant-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608496" comment="php7-exif-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608497" comment="php7-fastcgi-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608498" comment="php7-fileinfo-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608499" comment="php7-firebird-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608500" comment="php7-fpm-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608501" comment="php7-ftp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608502" comment="php7-gd-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608503" comment="php7-gettext-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608504" comment="php7-gmp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608505" comment="php7-iconv-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608506" comment="php7-intl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608507" comment="php7-json-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608508" comment="php7-ldap-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608509" comment="php7-mbstring-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608510" comment="php7-mysql-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608511" comment="php7-odbc-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608512" comment="php7-opcache-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608513" comment="php7-openssl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608514" comment="php7-pcntl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608515" comment="php7-pdo-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608516" comment="php7-pear-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608517" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608518" comment="php7-pgsql-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608519" comment="php7-phar-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608520" comment="php7-posix-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608521" comment="php7-readline-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608522" comment="php7-shmop-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608523" comment="php7-snmp-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608524" comment="php7-soap-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608525" comment="php7-sockets-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608526" comment="php7-sodium-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608527" comment="php7-sqlite-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608528" comment="php7-sysvmsg-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608529" comment="php7-sysvsem-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608530" comment="php7-sysvshm-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608531" comment="php7-test-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608532" comment="php7-tidy-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608533" comment="php7-tokenizer-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608534" comment="php7-wddx-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608535" comment="php7-xmlreader-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608536" comment="php7-xmlrpc-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608537" comment="php7-xmlwriter-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608538" comment="php7-xsl-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608539" comment="php7-zip-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608540" comment="php7-zlib-7.2.5-lp151.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11059</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11059" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11059" ref_url="https://www.suse.com/security/cve/CVE-2019-11059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    Das U-Boot 2016.11-rc1 through 2019.04 mishandles the ext4 64-bit extension, resulting in a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-11059/">CVE-2019-11059</cve>
	<bugzilla href="https://bugzilla.suse.com/1134853">SUSE bug 1134853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1221-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html" source="SUSE-SU"/>
    <description>
    libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601283" comment="libxslt-devel-1.1.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601284" comment="libxslt-devel-32bit-1.1.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155745" comment="libxslt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601285" comment="libxslt-python-1.1.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155746" comment="libxslt-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601286" comment="libxslt-tools-1.1.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601287" comment="libxslt1-1.1.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601288" comment="libxslt1-32bit-1.1.32-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155749" comment="libxslt1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602021" comment="rmt-server-2.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602022" comment="rmt-server-config-2.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602023" comment="rmt-server-pubcloud-2.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11085</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11085" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11085" ref_url="https://www.suse.com/security/cve/CVE-2019-11085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11085/">CVE-2019-11085</cve>
	<bugzilla href="https://bugzilla.suse.com/1135278">SUSE bug 1135278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135280">SUSE bug 1135280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11091</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135394">SUSE bug 1135394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601989" comment="ucode-intel-20190618-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609646" comment="xen-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609647" comment="xen-devel-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609648" comment="xen-doc-html-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609649" comment="xen-libs-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609650" comment="xen-libs-32bit-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609651" comment="xen-tools-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609652" comment="xen-tools-domU-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11135</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2958-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="TID000019563" ref_url="https://www.suse.com/support/kb/doc/?id=000019563" source="SUSE-SU"/>
		<reference ref_id="TID7024251" ref_url="https://www.suse.com/support/kb/doc/?id=7024251" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html" source="SUSE-SU"/>
    <description>
    TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152506">SUSE bug 1152506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603643" comment="kernel-debug-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603644" comment="kernel-debug-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603645" comment="kernel-debug-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603646" comment="kernel-default-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603647" comment="kernel-default-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603648" comment="kernel-default-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603649" comment="kernel-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603650" comment="kernel-docs-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603651" comment="kernel-docs-html-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603652" comment="kernel-kvmsmall-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603653" comment="kernel-kvmsmall-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603654" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603655" comment="kernel-macros-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603656" comment="kernel-obs-build-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603657" comment="kernel-obs-qa-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603658" comment="kernel-source-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603659" comment="kernel-source-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603660" comment="kernel-syms-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603661" comment="kernel-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603662" comment="kernel-vanilla-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603663" comment="kernel-vanilla-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603672" comment="qemu-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603673" comment="qemu-arm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603674" comment="qemu-audio-alsa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603675" comment="qemu-audio-oss-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603676" comment="qemu-audio-pa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603677" comment="qemu-audio-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603678" comment="qemu-block-curl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603679" comment="qemu-block-dmg-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603680" comment="qemu-block-gluster-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603681" comment="qemu-block-iscsi-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603682" comment="qemu-block-nfs-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603683" comment="qemu-block-rbd-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603684" comment="qemu-block-ssh-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603685" comment="qemu-extra-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603686" comment="qemu-guest-agent-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603687" comment="qemu-ipxe-1.0.0+-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603688" comment="qemu-ksm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603689" comment="qemu-kvm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603690" comment="qemu-lang-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603691" comment="qemu-linux-user-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603692" comment="qemu-ppc-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603693" comment="qemu-s390-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603694" comment="qemu-seabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603695" comment="qemu-sgabios-8-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603696" comment="qemu-tools-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603697" comment="qemu-ui-curses-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603698" comment="qemu-ui-gtk-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603699" comment="qemu-ui-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603700" comment="qemu-vgabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603701" comment="qemu-x86-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604342" comment="spectre-meltdown-checker-0.43-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275301" comment="spectre-meltdown-checker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603724" comment="ucode-intel-20191112a-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603664" comment="xen-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603665" comment="xen-devel-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603666" comment="xen-doc-html-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603667" comment="xen-libs-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603668" comment="xen-libs-32bit-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603669" comment="xen-tools-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603670" comment="xen-tools-domU-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11139" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2958-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006195.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html" source="SUSE-SU"/>
    <description>
    Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603724" comment="ucode-intel-20191112a-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11234</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005429.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00105.html" source="SUSE-SU"/>
    <description>
    FreeRADIUS before 3.0.19 does not prevent use of reflection for authentication spoofing, aka a "Dragonblood" issue, a similar issue to CVE-2019-9497.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234</cve>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607547" comment="freeradius-server-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157108" comment="freeradius-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607548" comment="freeradius-server-devel-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157109" comment="freeradius-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607549" comment="freeradius-server-doc-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157110" comment="freeradius-server-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607550" comment="freeradius-server-krb5-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157111" comment="freeradius-server-krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607551" comment="freeradius-server-ldap-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157112" comment="freeradius-server-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607552" comment="freeradius-server-libs-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157113" comment="freeradius-server-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607553" comment="freeradius-server-mysql-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157114" comment="freeradius-server-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607554" comment="freeradius-server-perl-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157115" comment="freeradius-server-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607555" comment="freeradius-server-postgresql-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157116" comment="freeradius-server-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607556" comment="freeradius-server-python-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157117" comment="freeradius-server-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607557" comment="freeradius-server-sqlite-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157118" comment="freeradius-server-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607558" comment="freeradius-server-utils-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157119" comment="freeradius-server-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11235</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11235" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005429.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00105.html" source="SUSE-SU"/>
    <description>
    FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235</cve>
	<bugzilla href="https://bugzilla.suse.com/1132549">SUSE bug 1132549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607547" comment="freeradius-server-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157108" comment="freeradius-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607548" comment="freeradius-server-devel-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157109" comment="freeradius-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607549" comment="freeradius-server-doc-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157110" comment="freeradius-server-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607550" comment="freeradius-server-krb5-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157111" comment="freeradius-server-krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607551" comment="freeradius-server-ldap-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157112" comment="freeradius-server-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607552" comment="freeradius-server-libs-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157113" comment="freeradius-server-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607553" comment="freeradius-server-mysql-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157114" comment="freeradius-server-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607554" comment="freeradius-server-perl-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157115" comment="freeradius-server-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607555" comment="freeradius-server-postgresql-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157116" comment="freeradius-server-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607556" comment="freeradius-server-python-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157117" comment="freeradius-server-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607557" comment="freeradius-server-sqlite-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157118" comment="freeradius-server-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607558" comment="freeradius-server-utils-3.0.16-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157119" comment="freeradius-server-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11236</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11236" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236</cve>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602712" comment="python2-urllib3-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009264573" comment="python2-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602713" comment="python2-urllib3-test-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266833" comment="python2-urllib3-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602714" comment="python3-urllib3-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602715" comment="python3-urllib3-test-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266834" comment="python3-urllib3-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1125</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="TID000019474" ref_url="https://www.suse.com/support/kb/doc/?id=000019474" source="SUSE-SU"/>
		<reference ref_id="TID7023930" ref_url="https://www.suse.com/support/kb/doc/?id=7023930" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602144" comment="kernel-debug-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602145" comment="kernel-debug-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602146" comment="kernel-debug-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602147" comment="kernel-default-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602148" comment="kernel-default-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602149" comment="kernel-default-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602150" comment="kernel-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602151" comment="kernel-docs-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602152" comment="kernel-docs-html-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602153" comment="kernel-kvmsmall-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602154" comment="kernel-kvmsmall-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602155" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602156" comment="kernel-macros-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602157" comment="kernel-obs-build-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602158" comment="kernel-obs-qa-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602159" comment="kernel-source-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602160" comment="kernel-source-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602161" comment="kernel-syms-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602162" comment="kernel-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602163" comment="kernel-vanilla-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602164" comment="kernel-vanilla-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11324</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11324" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324</cve>
	<bugzilla href="https://bugzilla.suse.com/1132900">SUSE bug 1132900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602712" comment="python2-urllib3-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009264573" comment="python2-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602713" comment="python2-urllib3-test-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266833" comment="python2-urllib3-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602714" comment="python3-urllib3-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602715" comment="python3-urllib3-test-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266834" comment="python3-urllib3-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11328</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11328" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11328" ref_url="https://www.suse.com/security/cve/CVE-2019-11328" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/&lt;user&gt;/&lt;instance&gt;`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11328/">CVE-2019-11328</cve>
	<bugzilla href="https://bugzilla.suse.com/1128598">SUSE bug 1128598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604366" comment="singularity-3.6.0-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11338</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11338" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11338" ref_url="https://www.suse.com/security/cve/CVE-2019-11338" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00012.html" source="SUSE-SU"/>
    <description>
    libavcodec/hevcdec.c in FFmpeg 3.4 and 4.1.2 mishandles detection of duplicate first slices, which allows remote attackers to cause a denial of service (NULL pointer dereference and out-of-array access) or possibly have unspecified other impact via crafted HEVC data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11338/">CVE-2019-11338</cve>
	<bugzilla href="https://bugzilla.suse.com/1133155">SUSE bug 1133155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609618" comment="ffmpeg-4-libavcodec-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234594" comment="ffmpeg-4-libavcodec-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609619" comment="ffmpeg-4-libavdevice-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234595" comment="ffmpeg-4-libavdevice-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609620" comment="ffmpeg-4-libavfilter-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234596" comment="ffmpeg-4-libavfilter-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609621" comment="ffmpeg-4-libavformat-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234597" comment="ffmpeg-4-libavformat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609622" comment="ffmpeg-4-libavresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234598" comment="ffmpeg-4-libavresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609623" comment="ffmpeg-4-libavutil-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234599" comment="ffmpeg-4-libavutil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609624" comment="ffmpeg-4-libpostproc-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234600" comment="ffmpeg-4-libpostproc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609625" comment="ffmpeg-4-libswresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234601" comment="ffmpeg-4-libswresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609626" comment="ffmpeg-4-libswscale-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234602" comment="ffmpeg-4-libswscale-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609627" comment="ffmpeg-4-private-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234603" comment="ffmpeg-4-private-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609628" comment="libavcodec58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234604" comment="libavcodec58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510674" comment="libavcodec58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234605" comment="libavcodec58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609629" comment="libavdevice58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234606" comment="libavdevice58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510677" comment="libavdevice58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234607" comment="libavdevice58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609630" comment="libavfilter7-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234608" comment="libavfilter7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510680" comment="libavfilter7-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234609" comment="libavfilter7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609631" comment="libavformat58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234610" comment="libavformat58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510683" comment="libavformat58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234611" comment="libavformat58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609632" comment="libavresample4-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234612" comment="libavresample4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510686" comment="libavresample4-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234613" comment="libavresample4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609633" comment="libavutil56-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234614" comment="libavutil56 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510689" comment="libavutil56-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234615" comment="libavutil56-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609634" comment="libpostproc55-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234616" comment="libpostproc55 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510692" comment="libpostproc55-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234617" comment="libpostproc55-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609635" comment="libswresample3-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234618" comment="libswresample3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510695" comment="libswresample3-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234619" comment="libswresample3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609636" comment="libswscale5-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234620" comment="libswscale5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510698" comment="libswscale5-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234621" comment="libswscale5-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11339</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11339" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11339" ref_url="https://www.suse.com/security/cve/CVE-2019-11339" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11339/">CVE-2019-11339</cve>
	<bugzilla href="https://bugzilla.suse.com/1133153">SUSE bug 1133153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609618" comment="ffmpeg-4-libavcodec-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234594" comment="ffmpeg-4-libavcodec-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609619" comment="ffmpeg-4-libavdevice-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234595" comment="ffmpeg-4-libavdevice-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609620" comment="ffmpeg-4-libavfilter-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234596" comment="ffmpeg-4-libavfilter-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609621" comment="ffmpeg-4-libavformat-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234597" comment="ffmpeg-4-libavformat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609622" comment="ffmpeg-4-libavresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234598" comment="ffmpeg-4-libavresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609623" comment="ffmpeg-4-libavutil-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234599" comment="ffmpeg-4-libavutil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609624" comment="ffmpeg-4-libpostproc-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234600" comment="ffmpeg-4-libpostproc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609625" comment="ffmpeg-4-libswresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234601" comment="ffmpeg-4-libswresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609626" comment="ffmpeg-4-libswscale-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234602" comment="ffmpeg-4-libswscale-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609627" comment="ffmpeg-4-private-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234603" comment="ffmpeg-4-private-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609628" comment="libavcodec58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234604" comment="libavcodec58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510674" comment="libavcodec58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234605" comment="libavcodec58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609629" comment="libavdevice58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234606" comment="libavdevice58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510677" comment="libavdevice58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234607" comment="libavdevice58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609630" comment="libavfilter7-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234608" comment="libavfilter7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510680" comment="libavfilter7-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234609" comment="libavfilter7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609631" comment="libavformat58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234610" comment="libavformat58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510683" comment="libavformat58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234611" comment="libavformat58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609632" comment="libavresample4-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234612" comment="libavresample4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510686" comment="libavresample4-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234613" comment="libavresample4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609633" comment="libavutil56-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234614" comment="libavutil56 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510689" comment="libavutil56-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234615" comment="libavutil56-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609634" comment="libpostproc55-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234616" comment="libpostproc55 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510692" comment="libpostproc55-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234617" comment="libpostproc55-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609635" comment="libswresample3-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234618" comment="libswresample3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510695" comment="libswresample3-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234619" comment="libswresample3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609636" comment="libswscale5-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234620" comment="libswscale5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510698" comment="libswscale5-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234621" comment="libswscale5-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11358</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602031" comment="python3-Django-2.2.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173965" comment="python3-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11459</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00089.html" source="SUSE-SU"/>
    <description>
    The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601635" comment="evince-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151448" comment="evince is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601636" comment="evince-devel-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009159434" comment="evince-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601637" comment="evince-lang-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151449" comment="evince-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601638" comment="evince-plugin-comicsdocument-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154092" comment="evince-plugin-comicsdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601639" comment="evince-plugin-djvudocument-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154093" comment="evince-plugin-djvudocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601640" comment="evince-plugin-dvidocument-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154094" comment="evince-plugin-dvidocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601641" comment="evince-plugin-pdfdocument-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154095" comment="evince-plugin-pdfdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601642" comment="evince-plugin-psdocument-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154096" comment="evince-plugin-psdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601643" comment="evince-plugin-tiffdocument-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154097" comment="evince-plugin-tiffdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601644" comment="evince-plugin-xpsdocument-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154098" comment="evince-plugin-xpsdocument is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601645" comment="libevdocument3-4-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151450" comment="libevdocument3-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601646" comment="libevview3-3-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151451" comment="libevview3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601647" comment="nautilus-evince-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151452" comment="nautilus-evince is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601648" comment="typelib-1_0-EvinceDocument-3_0-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151453" comment="typelib-1_0-EvinceDocument-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601649" comment="typelib-1_0-EvinceView-3_0-3.26.0+20180128.1bd86963-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151454" comment="typelib-1_0-EvinceView-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11470</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601584" comment="ImageMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601585" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601586" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601587" comment="ImageMagick-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601588" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601589" comment="ImageMagick-doc-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601590" comment="ImageMagick-extra-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601591" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601592" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601593" comment="libMagick++-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601594" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601595" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601596" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601597" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601598" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601599" comment="perl-PerlMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11472</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601584" comment="ImageMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601585" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601586" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601587" comment="ImageMagick-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601588" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601589" comment="ImageMagick-doc-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601590" comment="ImageMagick-extra-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601591" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601592" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601593" comment="libMagick++-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601594" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601595" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601596" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601597" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601598" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601599" comment="perl-PerlMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11477</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11478</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11479</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11486</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173667">SUSE bug 1173667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11487</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.1-rc5 allows page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11494</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11494" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11494" ref_url="https://www.suse.com/security/cve/CVE-2019-11494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00026.html" source="SUSE-SU"/>
    <description>
    In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11494/">CVE-2019-11494</cve>
	<bugzilla href="https://bugzilla.suse.com/1133624">SUSE bug 1133624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133625">SUSE bug 1133625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603234" comment="dovecot23-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603235" comment="dovecot23-backend-mysql-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603236" comment="dovecot23-backend-pgsql-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603237" comment="dovecot23-backend-sqlite-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603238" comment="dovecot23-devel-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603239" comment="dovecot23-fts-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603240" comment="dovecot23-fts-lucene-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603241" comment="dovecot23-fts-solr-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603242" comment="dovecot23-fts-squat-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498</cve>
	<bugzilla href="https://bugzilla.suse.com/1133384">SUSE bug 1133384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11499</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11499" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11499" ref_url="https://www.suse.com/security/cve/CVE-2019-11499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00026.html" source="SUSE-SU"/>
    <description>
    In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11499/">CVE-2019-11499</cve>
	<bugzilla href="https://bugzilla.suse.com/1133624">SUSE bug 1133624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133625">SUSE bug 1133625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603234" comment="dovecot23-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603235" comment="dovecot23-backend-mysql-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603236" comment="dovecot23-backend-pgsql-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603237" comment="dovecot23-backend-sqlite-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603238" comment="dovecot23-devel-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603239" comment="dovecot23-fts-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603240" comment="dovecot23-fts-lucene-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603241" comment="dovecot23-fts-solr-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603242" comment="dovecot23-fts-squat-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11500</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11500" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00026.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500</cve>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603234" comment="dovecot23-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603235" comment="dovecot23-backend-mysql-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603236" comment="dovecot23-backend-pgsql-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603237" comment="dovecot23-backend-sqlite-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603238" comment="dovecot23-devel-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603239" comment="dovecot23-fts-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603240" comment="dovecot23-fts-lucene-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603241" comment="dovecot23-fts-solr-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603242" comment="dovecot23-fts-squat-2.3.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11505</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick from version 1.3.8 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WritePDBImage of coders/pdb.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to MagickBitStreamMSBWrite in magick/bit_stream.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601584" comment="ImageMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601585" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601586" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601587" comment="ImageMagick-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601588" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601589" comment="ImageMagick-doc-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601590" comment="ImageMagick-extra-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601591" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601592" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601593" comment="libMagick++-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601594" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601595" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601596" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601597" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601598" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601599" comment="perl-PerlMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11506</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to ExportRedQuantumType in magick/export.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506</cve>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601584" comment="ImageMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601585" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601586" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601587" comment="ImageMagick-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601588" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601589" comment="ImageMagick-doc-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601590" comment="ImageMagick-extra-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601591" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601592" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601593" comment="libMagick++-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601594" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601595" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601596" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601597" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601598" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601599" comment="perl-PerlMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11555</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11555" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555</cve>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11556" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11556" ref_url="https://www.suse.com/security/cve/CVE-2019-11556" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1810-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html" source="SUSE-SU"/>
    <description>
    Pagure before 5.6 allows XSS via the templates/blame.html blame view.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11556/">CVE-2019-11556</cve>
	<bugzilla href="https://bugzilla.suse.com/1176987">SUSE bug 1176987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605732" comment="pagure-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297553" comment="pagure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605733" comment="pagure-ci-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297554" comment="pagure-ci is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605734" comment="pagure-ev-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297555" comment="pagure-ev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605735" comment="pagure-loadjson-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297556" comment="pagure-loadjson is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605736" comment="pagure-logcom-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297557" comment="pagure-logcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605737" comment="pagure-milters-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297558" comment="pagure-milters is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605738" comment="pagure-mirror-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297559" comment="pagure-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605739" comment="pagure-theme-chameleon-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297560" comment="pagure-theme-chameleon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605740" comment="pagure-theme-default-openSUSE-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297561" comment="pagure-theme-default-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605741" comment="pagure-theme-default-upstream-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297562" comment="pagure-theme-default-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605742" comment="pagure-theme-pagureio-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297563" comment="pagure-theme-pagureio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605743" comment="pagure-theme-srcfpo-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297564" comment="pagure-theme-srcfpo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605744" comment="pagure-theme-upstream-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297565" comment="pagure-theme-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605745" comment="pagure-webhook-5.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297566" comment="pagure-webhook is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11596</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11596" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11596" ref_url="https://www.suse.com/security/cve/CVE-2019-11596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html" source="SUSE-SU"/>
    <description>
    In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11596/">CVE-2019-11596</cve>
	<bugzilla href="https://bugzilla.suse.com/1133817">SUSE bug 1133817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608183" comment="memcached-1.5.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153862" comment="memcached is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608184" comment="memcached-devel-1.5.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153863" comment="memcached-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11597</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601973" comment="ImageMagick-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601974" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601975" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601976" comment="ImageMagick-devel-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601977" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601978" comment="ImageMagick-doc-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601979" comment="ImageMagick-extra-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601980" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601981" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601982" comment="libMagick++-devel-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601983" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601984" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601985" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601986" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601987" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601988" comment="perl-PerlMagick-7.0.7.34-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11598</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601584" comment="ImageMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601585" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601586" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601587" comment="ImageMagick-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601588" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601589" comment="ImageMagick-doc-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601590" comment="ImageMagick-extra-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601591" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601592" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601593" comment="libMagick++-devel-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601594" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601595" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601596" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601597" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601598" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601599" comment="perl-PerlMagick-7.0.7.34-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11599</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<bugzilla href="https://bugzilla.suse.com/1131645">SUSE bug 1131645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157905">SUSE bug 1157905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601814" comment="kernel-debug-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601815" comment="kernel-debug-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601816" comment="kernel-debug-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601817" comment="kernel-default-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601818" comment="kernel-default-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601819" comment="kernel-default-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601820" comment="kernel-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601821" comment="kernel-docs-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601822" comment="kernel-docs-html-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601823" comment="kernel-kvmsmall-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601824" comment="kernel-kvmsmall-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601825" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601826" comment="kernel-macros-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601827" comment="kernel-obs-build-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601828" comment="kernel-obs-qa-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601829" comment="kernel-source-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601830" comment="kernel-source-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601831" comment="kernel-syms-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601832" comment="kernel-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601833" comment="kernel-vanilla-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601834" comment="kernel-vanilla-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11690</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11690" ref_url="https://www.suse.com/security/cve/CVE-2019-11690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11690/">CVE-2019-11690</cve>
	<bugzilla href="https://bugzilla.suse.com/1134157">SUSE bug 1134157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11703</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11703" ref_url="https://www.suse.com/security/cve/CVE-2019-11703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1577-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11703/">CVE-2019-11703</cve>
	<bugzilla href="https://bugzilla.suse.com/1137595">SUSE bug 1137595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601605" comment="MozillaThunderbird-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601606" comment="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601607" comment="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601608" comment="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11704" ref_url="https://www.suse.com/security/cve/CVE-2019-11704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1577-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11704/">CVE-2019-11704</cve>
	<bugzilla href="https://bugzilla.suse.com/1137595">SUSE bug 1137595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601605" comment="MozillaThunderbird-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601606" comment="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601607" comment="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601608" comment="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11705" ref_url="https://www.suse.com/security/cve/CVE-2019-11705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1577-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A flaw in Thunderbird's implementation of iCal causes a stack buffer overflow in icalrecur_add_bydayrules when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11705/">CVE-2019-11705</cve>
	<bugzilla href="https://bugzilla.suse.com/1137595">SUSE bug 1137595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601605" comment="MozillaThunderbird-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601606" comment="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601607" comment="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601608" comment="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11706</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11706" ref_url="https://www.suse.com/security/cve/CVE-2019-11706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1577-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A flaw in Thunderbird's implementation of iCal causes a type confusion in icaltimezone_get_vtimezone_properties when processing certain email messages, resulting in a crash. This vulnerability affects Thunderbird &lt; 60.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11706/">CVE-2019-11706</cve>
	<bugzilla href="https://bugzilla.suse.com/1137595">SUSE bug 1137595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601605" comment="MozillaThunderbird-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601606" comment="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601607" comment="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601608" comment="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 60.7.1, Firefox &lt; 67.0.3, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601605" comment="MozillaThunderbird-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601606" comment="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601607" comment="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601608" comment="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11708</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR &lt; 60.7.2, Firefox &lt; 67.0.4, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601578" comment="MozillaFirefox-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601579" comment="MozillaFirefox-branding-upstream-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601580" comment="MozillaFirefox-buildsymbols-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601581" comment="MozillaFirefox-devel-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601582" comment="MozillaFirefox-translations-common-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601583" comment="MozillaFirefox-translations-other-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601605" comment="MozillaThunderbird-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601606" comment="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601607" comment="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601608" comment="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11709</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601948" comment="MozillaFirefox-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601949" comment="MozillaFirefox-branding-upstream-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601950" comment="MozillaFirefox-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601951" comment="MozillaFirefox-devel-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601952" comment="MozillaFirefox-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601953" comment="MozillaFirefox-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11710</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11711</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601948" comment="MozillaFirefox-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601949" comment="MozillaFirefox-branding-upstream-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601950" comment="MozillaFirefox-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601951" comment="MozillaFirefox-devel-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601952" comment="MozillaFirefox-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601953" comment="MozillaFirefox-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11712</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601948" comment="MozillaFirefox-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601949" comment="MozillaFirefox-branding-upstream-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601950" comment="MozillaFirefox-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601951" comment="MozillaFirefox-devel-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601952" comment="MozillaFirefox-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601953" comment="MozillaFirefox-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11713</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601948" comment="MozillaFirefox-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601949" comment="MozillaFirefox-branding-upstream-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601950" comment="MozillaFirefox-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601951" comment="MozillaFirefox-devel-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601952" comment="MozillaFirefox-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601953" comment="MozillaFirefox-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11714</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11714" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11715</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601948" comment="MozillaFirefox-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601949" comment="MozillaFirefox-branding-upstream-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601950" comment="MozillaFirefox-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601951" comment="MozillaFirefox-devel-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601952" comment="MozillaFirefox-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601953" comment="MozillaFirefox-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11716</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11716" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11717</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601948" comment="MozillaFirefox-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601949" comment="MozillaFirefox-branding-upstream-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601950" comment="MozillaFirefox-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601951" comment="MozillaFirefox-devel-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601952" comment="MozillaFirefox-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601953" comment="MozillaFirefox-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11718</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11718" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11719</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601948" comment="MozillaFirefox-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601949" comment="MozillaFirefox-branding-upstream-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601950" comment="MozillaFirefox-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601951" comment="MozillaFirefox-devel-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601952" comment="MozillaFirefox-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601953" comment="MozillaFirefox-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11720</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11720" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11721</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11721" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The unicode latin 'kra' character can be used to spoof a standard 'k' character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11723</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11723" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different "containers" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11724</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11724" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11725</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11725" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11727</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11728</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11728" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11729</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601948" comment="MozillaFirefox-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601949" comment="MozillaFirefox-branding-upstream-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601950" comment="MozillaFirefox-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601951" comment="MozillaFirefox-devel-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601952" comment="MozillaFirefox-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601953" comment="MozillaFirefox-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11730</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601948" comment="MozillaFirefox-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601949" comment="MozillaFirefox-branding-upstream-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601950" comment="MozillaFirefox-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601951" comment="MozillaFirefox-devel-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601952" comment="MozillaFirefox-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601953" comment="MozillaFirefox-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11733</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11733" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox &lt; 68.0.2 and Firefox ESR &lt; 68.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11735</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<bugzilla href="https://bugzilla.suse.com/1149293">SUSE bug 1149293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11736</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11736" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. &lt;br&gt;*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<bugzilla href="https://bugzilla.suse.com/1149292">SUSE bug 1149292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11738</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11738" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<bugzilla href="https://bugzilla.suse.com/1149302">SUSE bug 1149302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11739</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11739" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11739" ref_url="https://www.suse.com/security/cve/CVE-2019-11739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird &lt; 68.1 and Thunderbird &lt; 60.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11739/">CVE-2019-11739</cve>
	<bugzilla href="https://bugzilla.suse.com/1150939">SUSE bug 1150939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11740</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11742</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a &amp;lt;canvas&amp;gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11743</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11744</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Some HTML elements, such as &amp;lt;title&amp;gt; and &amp;lt;textarea&amp;gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11745</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html" source="SUSE-SU"/>
    <description>
    When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606217" comment="MozillaFirefox-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606218" comment="MozillaFirefox-branding-upstream-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606219" comment="MozillaFirefox-buildsymbols-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606220" comment="MozillaFirefox-devel-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606221" comment="MozillaFirefox-translations-common-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606222" comment="MozillaFirefox-translations-other-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607008" comment="MozillaThunderbird-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607009" comment="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607010" comment="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608465" comment="libfreebl3-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608466" comment="libfreebl3-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608467" comment="libfreebl3-hmac-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608468" comment="libfreebl3-hmac-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608469" comment="libsoftokn3-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608470" comment="libsoftokn3-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608471" comment="libsoftokn3-hmac-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608472" comment="libsoftokn3-hmac-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608473" comment="mozilla-nspr-4.23-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608474" comment="mozilla-nspr-32bit-4.23-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608475" comment="mozilla-nspr-devel-4.23-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608476" comment="mozilla-nss-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608477" comment="mozilla-nss-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608478" comment="mozilla-nss-certs-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608479" comment="mozilla-nss-certs-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608480" comment="mozilla-nss-devel-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608481" comment="mozilla-nss-sysinit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608482" comment="mozilla-nss-sysinit-32bit-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608483" comment="mozilla-nss-tools-3.47.1-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11746</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11747</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11747" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The "Forget about this site" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site's HSTS setting will be restored. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<bugzilla href="https://bugzilla.suse.com/1149301">SUSE bug 1149301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11748</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11748" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<bugzilla href="https://bugzilla.suse.com/1149291">SUSE bug 1149291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11749" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<bugzilla href="https://bugzilla.suse.com/1149290">SUSE bug 1149290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11750</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11750" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<bugzilla href="https://bugzilla.suse.com/1149289">SUSE bug 1149289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11751" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. &lt;br&gt;*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<bugzilla href="https://bugzilla.suse.com/1149286">SUSE bug 1149286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11753</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11753" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. &lt;br&gt;*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox &lt; 69, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11755</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11755" ref_url="https://www.suse.com/security/cve/CVE-2019-11755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A crafted S/MIME message consisting of an inner encryption layer and an outer SignedData layer was shown as having a valid digital signature, although the signer might have had no access to the contents of the encrypted message, and might have stripped a different signature from the encrypted message. Previous versions had only suppressed showing a digital signature for messages with an outer multipart/signed layer. This vulnerability affects Thunderbird &lt; 68.1.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11755/">CVE-2019-11755</cve>
	<bugzilla href="https://bugzilla.suse.com/1152375">SUSE bug 1152375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603132" comment="MozillaThunderbird-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603133" comment="MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603134" comment="MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603135" comment="MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603136" comment="enigmail-2.1.2-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11757</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    When following the value's prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603605" comment="MozillaFirefox-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603606" comment="MozillaFirefox-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270406" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603607" comment="MozillaFirefox-branding-upstream-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603608" comment="MozillaFirefox-buildsymbols-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603609" comment="MozillaFirefox-devel-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603610" comment="MozillaFirefox-translations-common-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603611" comment="MozillaFirefox-translations-other-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603613" comment="MozillaThunderbird-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603614" comment="MozillaThunderbird-translations-common-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603615" comment="MozillaThunderbird-translations-other-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11758</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11758" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603605" comment="MozillaFirefox-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603606" comment="MozillaFirefox-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270406" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603607" comment="MozillaFirefox-branding-upstream-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603608" comment="MozillaFirefox-buildsymbols-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603609" comment="MozillaFirefox-devel-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603610" comment="MozillaFirefox-translations-common-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603611" comment="MozillaFirefox-translations-other-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603613" comment="MozillaThunderbird-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603614" comment="MozillaThunderbird-translations-common-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603615" comment="MozillaThunderbird-translations-other-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603612" comment="firefox-esr-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270407" comment="firefox-esr-branding-openSUSE is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11759</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603605" comment="MozillaFirefox-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603606" comment="MozillaFirefox-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270406" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603607" comment="MozillaFirefox-branding-upstream-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603608" comment="MozillaFirefox-buildsymbols-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603609" comment="MozillaFirefox-devel-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603610" comment="MozillaFirefox-translations-common-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603611" comment="MozillaFirefox-translations-other-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603613" comment="MozillaThunderbird-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603614" comment="MozillaThunderbird-translations-common-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603615" comment="MozillaThunderbird-translations-other-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603612" comment="firefox-esr-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270407" comment="firefox-esr-branding-openSUSE is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603605" comment="MozillaFirefox-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603606" comment="MozillaFirefox-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270406" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603607" comment="MozillaFirefox-branding-upstream-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603608" comment="MozillaFirefox-buildsymbols-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603609" comment="MozillaFirefox-devel-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603610" comment="MozillaFirefox-translations-common-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603611" comment="MozillaFirefox-translations-other-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603613" comment="MozillaThunderbird-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603614" comment="MozillaThunderbird-translations-common-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603615" comment="MozillaThunderbird-translations-other-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603612" comment="firefox-esr-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270407" comment="firefox-esr-branding-openSUSE is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11761</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603605" comment="MozillaFirefox-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603606" comment="MozillaFirefox-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270406" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603607" comment="MozillaFirefox-branding-upstream-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603608" comment="MozillaFirefox-buildsymbols-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603609" comment="MozillaFirefox-devel-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603610" comment="MozillaFirefox-translations-common-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603611" comment="MozillaFirefox-translations-other-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603613" comment="MozillaThunderbird-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603614" comment="MozillaThunderbird-translations-common-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603615" comment="MozillaThunderbird-translations-other-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603612" comment="firefox-esr-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270407" comment="firefox-esr-branding-openSUSE is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11762</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603605" comment="MozillaFirefox-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603606" comment="MozillaFirefox-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270406" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603607" comment="MozillaFirefox-branding-upstream-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603608" comment="MozillaFirefox-buildsymbols-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603609" comment="MozillaFirefox-devel-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603610" comment="MozillaFirefox-translations-common-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603611" comment="MozillaFirefox-translations-other-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603613" comment="MozillaThunderbird-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603614" comment="MozillaThunderbird-translations-common-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603615" comment="MozillaThunderbird-translations-other-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603612" comment="firefox-esr-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270407" comment="firefox-esr-branding-openSUSE is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11763</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters - enabling the use of entities to mask the actual characters of interest from filters. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603605" comment="MozillaFirefox-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603606" comment="MozillaFirefox-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270406" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603607" comment="MozillaFirefox-branding-upstream-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603608" comment="MozillaFirefox-buildsymbols-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603609" comment="MozillaFirefox-devel-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603610" comment="MozillaFirefox-translations-common-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603611" comment="MozillaFirefox-translations-other-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603613" comment="MozillaThunderbird-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603614" comment="MozillaThunderbird-translations-common-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603615" comment="MozillaThunderbird-translations-other-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603612" comment="firefox-esr-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270407" comment="firefox-esr-branding-openSUSE is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11764</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603605" comment="MozillaFirefox-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603606" comment="MozillaFirefox-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270406" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603607" comment="MozillaFirefox-branding-upstream-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603608" comment="MozillaFirefox-buildsymbols-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603609" comment="MozillaFirefox-devel-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603610" comment="MozillaFirefox-translations-common-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603611" comment="MozillaFirefox-translations-other-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603613" comment="MozillaThunderbird-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603614" comment="MozillaThunderbird-translations-common-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603615" comment="MozillaThunderbird-translations-other-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603612" comment="firefox-esr-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270407" comment="firefox-esr-branding-openSUSE is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11768</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11768" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11768" ref_url="https://www.suse.com/security/cve/CVE-2019-11768" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1689-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11768/">CVE-2019-11768</cve>
	<bugzilla href="https://bugzilla.suse.com/1137496">SUSE bug 1137496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609738" comment="phpMyAdmin-4.9.0.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11779</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11779" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11779" ref_url="https://www.suse.com/security/cve/CVE-2019-11779" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00008.html" source="SUSE-SU"/>
    <description>
    In Eclipse Mosquitto 1.5.0 to 1.6.5 inclusive, if a malicious MQTT client sends a SUBSCRIBE packet containing a topic that consists of approximately 65400 or more '/' characters, i.e. the topic hierarchy separator, then a stack overflow will occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11779/">CVE-2019-11779</cve>
	<bugzilla href="https://bugzilla.suse.com/1151494">SUSE bug 1151494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603055" comment="libmosquitto1-1.5.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244945" comment="libmosquitto1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603056" comment="libmosquittopp1-1.5.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244946" comment="libmosquittopp1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603057" comment="mosquitto-1.5.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244947" comment="mosquitto is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603058" comment="mosquitto-clients-1.5.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244948" comment="mosquitto-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603059" comment="mosquitto-devel-1.5.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244949" comment="mosquitto-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11810</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602144" comment="kernel-debug-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602145" comment="kernel-debug-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602146" comment="kernel-debug-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602147" comment="kernel-default-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602148" comment="kernel-default-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602149" comment="kernel-default-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602150" comment="kernel-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602151" comment="kernel-docs-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602152" comment="kernel-docs-html-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602153" comment="kernel-kvmsmall-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602154" comment="kernel-kvmsmall-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602155" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602156" comment="kernel-macros-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602157" comment="kernel-obs-build-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602158" comment="kernel-obs-qa-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602159" comment="kernel-source-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602160" comment="kernel-source-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602161" comment="kernel-syms-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602162" comment="kernel-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602163" comment="kernel-vanilla-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602164" comment="kernel-vanilla-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11811</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11811" ref_url="https://www.suse.com/security/cve/CVE-2019-11811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11811/">CVE-2019-11811</cve>
	<bugzilla href="https://bugzilla.suse.com/1134397">SUSE bug 1134397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11815</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11833</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11884</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139868">SUSE bug 1139868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11922</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11922" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11922" ref_url="https://www.suse.com/security/cve/CVE-2019-11922" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00078.html" source="SUSE-SU"/>
    <description>
    A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11922/">CVE-2019-11922</cve>
	<bugzilla href="https://bugzilla.suse.com/1142941">SUSE bug 1142941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602043" comment="libzstd-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262523" comment="libzstd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602044" comment="libzstd-devel-static-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262524" comment="libzstd-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602045" comment="libzstd1-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262525" comment="libzstd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602046" comment="libzstd1-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266836" comment="libzstd1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602047" comment="zstd-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262526" comment="zstd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
    <description>
    In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's-&gt;dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603672" comment="qemu-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603673" comment="qemu-arm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603674" comment="qemu-audio-alsa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603675" comment="qemu-audio-oss-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603676" comment="qemu-audio-pa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603677" comment="qemu-audio-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603678" comment="qemu-block-curl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603679" comment="qemu-block-dmg-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603680" comment="qemu-block-gluster-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603681" comment="qemu-block-iscsi-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603682" comment="qemu-block-nfs-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603683" comment="qemu-block-rbd-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603684" comment="qemu-block-ssh-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603685" comment="qemu-extra-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603686" comment="qemu-guest-agent-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603687" comment="qemu-ipxe-1.0.0+-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603688" comment="qemu-ksm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603689" comment="qemu-kvm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603690" comment="qemu-lang-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603691" comment="qemu-linux-user-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603692" comment="qemu-ppc-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603693" comment="qemu-s390-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603694" comment="qemu-seabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603695" comment="qemu-sgabios-8-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603696" comment="qemu-tools-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603697" comment="qemu-ui-curses-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603698" comment="qemu-ui-gtk-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603699" comment="qemu-ui-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603700" comment="qemu-vgabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603701" comment="qemu-x86-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12083</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12083" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12083" ref_url="https://www.suse.com/security/cve/CVE-2019-12083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00031.html" source="SUSE-SU"/>
    <description>
    The Rust Programming Language Standard Library 1.34.x before 1.34.2 contains a stabilized method which, if overridden, can violate Rust's safety guarantees and cause memory unsafety. If the `Error::type_id` method is overridden then any type can be safely cast to any other type, causing memory safety vulnerabilities in safe code (e.g., out-of-bounds write or read). Code that does not manually implement Error::type_id is unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12083/">CVE-2019-12083</cve>
	<bugzilla href="https://bugzilla.suse.com/1134978">SUSE bug 1134978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603251" comment="cargo-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265404" comment="cargo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603252" comment="cargo-doc-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265405" comment="cargo-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603253" comment="clippy-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265406" comment="clippy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603254" comment="rls-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265407" comment="rls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603255" comment="rust-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238244" comment="rust is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603256" comment="rust-analysis-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265408" comment="rust-analysis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603257" comment="rust-cbindgen-0.8.7-lp151.5.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603258" comment="rust-doc-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238245" comment="rust-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603259" comment="rust-gdb-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238246" comment="rust-gdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603260" comment="rust-src-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238247" comment="rust-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603261" comment="rust-std-static-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265410" comment="rust-std-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603262" comment="rustfmt-1.36.0-lp151.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265411" comment="rustfmt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12098</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12098" ref_url="https://www.suse.com/security/cve/CVE-2019-12098" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1888-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" source="SUSE-SU"/>
    <description>
    In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-12098/">CVE-2019-12098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601657" comment="libheimdal-7.7.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162039" comment="libheimdal is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601658" comment="libheimdal-devel-7.7.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162041" comment="libheimdal-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12155</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html" source="SUSE-SU"/>
    <description>
    interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602543" comment="qemu-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602544" comment="qemu-arm-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602545" comment="qemu-audio-alsa-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602546" comment="qemu-audio-oss-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602547" comment="qemu-audio-pa-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602548" comment="qemu-audio-sdl-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602549" comment="qemu-block-curl-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602550" comment="qemu-block-dmg-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602551" comment="qemu-block-gluster-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602552" comment="qemu-block-iscsi-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602553" comment="qemu-block-nfs-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602554" comment="qemu-block-rbd-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602555" comment="qemu-block-ssh-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602556" comment="qemu-extra-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602557" comment="qemu-guest-agent-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602558" comment="qemu-ipxe-1.0.0+-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602559" comment="qemu-ksm-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602560" comment="qemu-kvm-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602561" comment="qemu-lang-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602562" comment="qemu-linux-user-3.1.1-lp151.7.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602563" comment="qemu-ppc-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602564" comment="qemu-s390-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602565" comment="qemu-seabios-1.12.0-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602566" comment="qemu-sgabios-8-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602567" comment="qemu-testsuite-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602568" comment="qemu-tools-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602569" comment="qemu-ui-curses-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602570" comment="qemu-ui-gtk-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602571" comment="qemu-ui-sdl-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602572" comment="qemu-vgabios-1.12.0-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602573" comment="qemu-x86-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12209</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12209" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12209" ref_url="https://www.suse.com/security/cve/CVE-2019-12209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005662.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12209/">CVE-2019-12209</cve>
	<bugzilla href="https://bugzilla.suse.com/1087061">SUSE bug 1087061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135727">SUSE bug 1135727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135729">SUSE bug 1135729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601667" comment="libu2f-host-devel-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244552" comment="libu2f-host-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601668" comment="libu2f-host-doc-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244553" comment="libu2f-host-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601669" comment="libu2f-host0-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244554" comment="libu2f-host0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601670" comment="pam_u2f-1.0.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260150" comment="pam_u2f is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601671" comment="u2f-host-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244555" comment="u2f-host is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12210</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12210" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12210" ref_url="https://www.suse.com/security/cve/CVE-2019-12210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005662.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00018.html" source="SUSE-SU"/>
    <description>
    In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12210/">CVE-2019-12210</cve>
	<bugzilla href="https://bugzilla.suse.com/1087061">SUSE bug 1087061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135727">SUSE bug 1135727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135729">SUSE bug 1135729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601667" comment="libu2f-host-devel-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244552" comment="libu2f-host-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601668" comment="libu2f-host-doc-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244553" comment="libu2f-host-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601669" comment="libu2f-host0-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244554" comment="libu2f-host0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601670" comment="pam_u2f-1.0.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260150" comment="pam_u2f is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601671" comment="u2f-host-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244555" comment="u2f-host is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12217</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12217" ref_url="https://www.suse.com/security/cve/CVE-2019-12217" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a NULL pointer dereference in the SDL stdio_read function in file/SDL_rwops.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12217/">CVE-2019-12217</cve>
	<bugzilla href="https://bugzilla.suse.com/1135787">SUSE bug 1135787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12218</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12218" ref_url="https://www.suse.com/security/cve/CVE-2019-12218" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a NULL pointer dereference in the SDL2_image function IMG_LoadPCX_RW at IMG_pcx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12218/">CVE-2019-12218</cve>
	<bugzilla href="https://bugzilla.suse.com/1135789">SUSE bug 1135789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12220</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12220" ref_url="https://www.suse.com/security/cve/CVE-2019-12220" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is an out-of-bounds read in the SDL function SDL_FreePalette_REAL at video/SDL_pixels.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12220/">CVE-2019-12220</cve>
	<bugzilla href="https://bugzilla.suse.com/1135806">SUSE bug 1135806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12221</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12221" ref_url="https://www.suse.com/security/cve/CVE-2019-12221" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a SEGV in the SDL function SDL_free_REAL at stdlib/SDL_malloc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-12221/">CVE-2019-12221</cve>
	<bugzilla href="https://bugzilla.suse.com/1135796">SUSE bug 1135796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12222</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12222" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12222" ref_url="https://www.suse.com/security/cve/CVE-2019-12222" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9. There is an out-of-bounds read in the function SDL_InvalidateMap at video/SDL_pixels.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12222/">CVE-2019-12222</cve>
	<bugzilla href="https://bugzilla.suse.com/1136101">SUSE bug 1136101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12248</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12248" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12248" ref_url="https://www.suse.com/security/cve/CVE-2019-12248" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.7, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. An attacker could send a malicious email to an OTRS system. If a logged-in agent user quotes it, the email could cause the browser to load external image resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12248/">CVE-2019-12248</cve>
	<bugzilla href="https://bugzilla.suse.com/1137615">SUSE bug 1137615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12269</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12269" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12269" ref_url="https://www.suse.com/security/cve/CVE-2019-12269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005590.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1612-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00061.html" source="SUSE-SU"/>
    <description>
    Enigmail before 2.0.11 allows PGP signature spoofing: for an inline PGP message, an attacker can cause the product to display a "correctly signed" message indication, but display different unauthenticated text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12269/">CVE-2019-12269</cve>
	<bugzilla href="https://bugzilla.suse.com/1135855">SUSE bug 1135855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609739" comment="enigmail-2.0.11-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176167" comment="enigmail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12290</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12290" ref_url="https://www.suse.com/security/cve/CVE-2019-12290" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12290/">CVE-2019-12290</cve>
	<bugzilla href="https://bugzilla.suse.com/1154884">SUSE bug 1154884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603843" comment="libidn2-0-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177212" comment="libidn2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603844" comment="libidn2-0-32bit-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177213" comment="libidn2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603845" comment="libidn2-devel-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273025" comment="libidn2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603846" comment="libidn2-lang-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273026" comment="libidn2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603847" comment="libidn2-tools-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273027" comment="libidn2-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12308</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12308" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12308" ref_url="https://www.suse.com/security/cve/CVE-2019-12308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12308/">CVE-2019-12308</cve>
	<bugzilla href="https://bugzilla.suse.com/1136468">SUSE bug 1136468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602031" comment="python3-Django-2.2.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173965" comment="python3-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12380</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<bugzilla href="https://bugzilla.suse.com/1136598">SUSE bug 1136598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155298">SUSE bug 1155298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12382</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155298">SUSE bug 1155298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12387</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12387" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00042.html" source="SUSE-SU"/>
    <description>
    In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387</cve>
	<bugzilla href="https://bugzilla.suse.com/1137825">SUSE bug 1137825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601837" comment="python-Twisted-doc-17.9.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153552" comment="python-Twisted-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601838" comment="python2-Twisted-17.9.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260377" comment="python2-Twisted is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601839" comment="python3-Twisted-17.9.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260379" comment="python3-Twisted is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12418</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12418" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0226-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html" source="SUSE-SU"/>
    <description>
    When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607241" comment="tomcat-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607242" comment="tomcat-admin-webapps-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607243" comment="tomcat-docs-webapp-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607244" comment="tomcat-el-3_0-api-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607245" comment="tomcat-embed-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607246" comment="tomcat-javadoc-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607247" comment="tomcat-jsp-2_3-api-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607248" comment="tomcat-jsvc-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607249" comment="tomcat-lib-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607250" comment="tomcat-servlet-4_0-api-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607251" comment="tomcat-webapps-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12435</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12435" ref_url="https://www.suse.com/security/cve/CVE-2019-12435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1574-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005626.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer dereference, leading to Denial of Service. This is related to the AD DC DNS management server (dnsserver) RPC server process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12435/">CVE-2019-12435</cve>
	<bugzilla href="https://bugzilla.suse.com/1137815">SUSE bug 1137815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601727" comment="ctdb-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601728" comment="ctdb-pcp-pmda-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601729" comment="ctdb-tests-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601730" comment="libdcerpc-binding0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601731" comment="libdcerpc-binding0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601732" comment="libdcerpc-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601733" comment="libdcerpc-samr-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601734" comment="libdcerpc-samr0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601735" comment="libdcerpc-samr0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601736" comment="libdcerpc0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601737" comment="libdcerpc0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601738" comment="libndr-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601739" comment="libndr-krb5pac-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601740" comment="libndr-krb5pac0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601741" comment="libndr-krb5pac0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601742" comment="libndr-nbt-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601743" comment="libndr-nbt0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601744" comment="libndr-nbt0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601745" comment="libndr-standard-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601746" comment="libndr-standard0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601747" comment="libndr-standard0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601748" comment="libndr0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601749" comment="libndr0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601750" comment="libnetapi-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601751" comment="libnetapi0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601752" comment="libnetapi0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601753" comment="libsamba-credentials-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601754" comment="libsamba-credentials0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601755" comment="libsamba-credentials0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601756" comment="libsamba-errors-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601757" comment="libsamba-errors0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601758" comment="libsamba-errors0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601759" comment="libsamba-hostconfig-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601760" comment="libsamba-hostconfig0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601761" comment="libsamba-hostconfig0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601762" comment="libsamba-passdb-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601763" comment="libsamba-passdb0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601764" comment="libsamba-passdb0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601765" comment="libsamba-policy-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601766" comment="libsamba-policy-python-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601767" comment="libsamba-policy-python3-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601768" comment="libsamba-policy0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601769" comment="libsamba-policy0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601770" comment="libsamba-policy0-python3-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601771" comment="libsamba-policy0-python3-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601772" comment="libsamba-util-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601773" comment="libsamba-util0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601774" comment="libsamba-util0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601775" comment="libsamdb-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601776" comment="libsamdb0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601777" comment="libsamdb0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601778" comment="libsmbclient-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601779" comment="libsmbclient0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601780" comment="libsmbclient0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601781" comment="libsmbconf-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601782" comment="libsmbconf0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601783" comment="libsmbconf0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601784" comment="libsmbldap-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601785" comment="libsmbldap2-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601786" comment="libsmbldap2-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601787" comment="libtevent-util-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601788" comment="libtevent-util0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601789" comment="libtevent-util0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601790" comment="libwbclient-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601791" comment="libwbclient0-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601792" comment="libwbclient0-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601793" comment="samba-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601794" comment="samba-ad-dc-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601795" comment="samba-ad-dc-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601796" comment="samba-ceph-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601797" comment="samba-client-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601798" comment="samba-client-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601799" comment="samba-core-devel-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601800" comment="samba-doc-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601801" comment="samba-dsdb-modules-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601802" comment="samba-libs-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601803" comment="samba-libs-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601804" comment="samba-libs-python-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601805" comment="samba-libs-python-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601806" comment="samba-libs-python3-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601807" comment="samba-libs-python3-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601808" comment="samba-pidl-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601809" comment="samba-python-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601810" comment="samba-python3-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601811" comment="samba-test-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601812" comment="samba-winbind-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601813" comment="samba-winbind-32bit-4.9.5+git.176.375e1f05788-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12439</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12439" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12439" ref_url="https://www.suse.com/security/cve/CVE-2019-12439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00015.html" source="SUSE-SU"/>
    <description>
    bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12439/">CVE-2019-12439</cve>
	<bugzilla href="https://bugzilla.suse.com/1136958">SUSE bug 1136958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601441" comment="bubblewrap-0.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177243" comment="bubblewrap is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12447</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12447" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12447" ref_url="https://www.suse.com/security/cve/CVE-2019-12447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-12447/">CVE-2019-12447</cve>
	<bugzilla href="https://bugzilla.suse.com/1136986">SUSE bug 1136986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601659" comment="gvfs-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245313" comment="gvfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601660" comment="gvfs-32bit-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245314" comment="gvfs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601661" comment="gvfs-backend-afc-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245315" comment="gvfs-backend-afc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601662" comment="gvfs-backend-samba-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245316" comment="gvfs-backend-samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601663" comment="gvfs-backends-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245317" comment="gvfs-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601664" comment="gvfs-devel-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245318" comment="gvfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601665" comment="gvfs-fuse-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245319" comment="gvfs-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601666" comment="gvfs-lang-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245320" comment="gvfs-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12448</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12448" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12448" ref_url="https://www.suse.com/security/cve/CVE-2019-12448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn't implement query_info_on_read/write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12448/">CVE-2019-12448</cve>
	<bugzilla href="https://bugzilla.suse.com/1136981">SUSE bug 1136981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601659" comment="gvfs-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245313" comment="gvfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601660" comment="gvfs-32bit-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245314" comment="gvfs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601661" comment="gvfs-backend-afc-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245315" comment="gvfs-backend-afc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601662" comment="gvfs-backend-samba-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245316" comment="gvfs-backend-samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601663" comment="gvfs-backends-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245317" comment="gvfs-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601664" comment="gvfs-devel-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245318" comment="gvfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601665" comment="gvfs-fuse-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245319" comment="gvfs-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601666" comment="gvfs-lang-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245320" comment="gvfs-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12449</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12449" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12449" ref_url="https://www.suse.com/security/cve/CVE-2019-12449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles a file's user and group ownership during move (and copy with G_FILE_COPY_ALL_METADATA) operations from admin:// to file:// URIs, because root privileges are unavailable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12449/">CVE-2019-12449</cve>
	<bugzilla href="https://bugzilla.suse.com/1136992">SUSE bug 1136992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601659" comment="gvfs-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245313" comment="gvfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601660" comment="gvfs-32bit-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245314" comment="gvfs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601661" comment="gvfs-backend-afc-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245315" comment="gvfs-backend-afc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601662" comment="gvfs-backend-samba-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245316" comment="gvfs-backend-samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601663" comment="gvfs-backends-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245317" comment="gvfs-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601664" comment="gvfs-devel-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245318" comment="gvfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601665" comment="gvfs-fuse-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245319" comment="gvfs-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601666" comment="gvfs-lang-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245320" comment="gvfs-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12456</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12456" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a "double fetch" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136993">SUSE bug 1136993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12497</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12497" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12497" ref_url="https://www.suse.com/security/cve/CVE-2019-12497" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. In the customer or external frontend, personal information of agents (e.g., Name and mail address) can be disclosed in external notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12497/">CVE-2019-12497</cve>
	<bugzilla href="https://bugzilla.suse.com/1137614">SUSE bug 1137614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12519</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12519" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607858" comment="squid-4.11-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12521</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12521" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607858" comment="squid-4.11-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12523</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12523" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165586">SUSE bug 1165586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12525</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12525" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2089-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12526</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12526" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12527" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12527" ref_url="https://www.suse.com/security/cve/CVE-2019-12527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 4.0.23 through 4.7. When checking Basic Authentication with HttpHeader::getAuth, Squid uses a global buffer to store the decoded data. Squid does not check that the decoded length isn't greater than the buffer, leading to a heap-based buffer overflow with user controlled data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12527/">CVE-2019-12527</cve>
	<bugzilla href="https://bugzilla.suse.com/1141330">SUSE bug 1141330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12528</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12528" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607858" comment="squid-4.11-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12529</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12529" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2089-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 2.x through 2.7.STABLE9, 3.x through 3.5.28, and 4.x through 4.7. When Squid is configured to use Basic Authentication, the Proxy-Authorization header is parsed via uudecode. uudecode determines how many bytes will be decoded by iterating over the input and checking its table. The length is then used to start decoding the string. There are no checks to ensure that the length it calculates isn't greater than the input buffer. This leads to adjacent memory being decoded as well. An attacker would not be able to retrieve the decoded data unless the Squid maintainer had configured the display of usernames on error pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12594</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12594" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12594" ref_url="https://www.suse.com/security/cve/CVE-2019-12594" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00053.html" source="SUSE-SU"/>
    <description>
    DOSBox 0.74-2 has Incorrect Access Control.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-12594/">CVE-2019-12594</cve>
	<bugzilla href="https://bugzilla.suse.com/1140254">SUSE bug 1140254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609740" comment="dosbox-0.74.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261752" comment="dosbox is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12614</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-&gt;name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601814" comment="kernel-debug-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601815" comment="kernel-debug-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601816" comment="kernel-debug-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601817" comment="kernel-default-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601818" comment="kernel-default-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601819" comment="kernel-default-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601820" comment="kernel-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601821" comment="kernel-docs-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601822" comment="kernel-docs-html-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601823" comment="kernel-kvmsmall-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601824" comment="kernel-kvmsmall-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601825" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601826" comment="kernel-macros-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601827" comment="kernel-obs-build-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601828" comment="kernel-obs-qa-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601829" comment="kernel-source-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601830" comment="kernel-source-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601831" comment="kernel-syms-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601832" comment="kernel-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601833" comment="kernel-vanilla-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601834" comment="kernel-vanilla-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12616</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12616" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12616" ref_url="https://www.suse.com/security/cve/CVE-2019-12616" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1689-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken &lt;img&gt; tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) to the victim.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12616/">CVE-2019-12616</cve>
	<bugzilla href="https://bugzilla.suse.com/1137497">SUSE bug 1137497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609738" comment="phpMyAdmin-4.9.0.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12625" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603812" comment="libclamav7-0.100.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231590" comment="libclamav7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603813" comment="libclammspack0-0.100.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231591" comment="libclammspack0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12735</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1561-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00075.html" source="SUSE-SU"/>
    <description>
    getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601444" comment="gvim-8.0.1568-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151192" comment="gvim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601835" comment="neovim-0.3.7-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256885" comment="neovim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601836" comment="neovim-lang-0.3.7-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256887" comment="neovim-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601445" comment="vim-8.0.1568-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151193" comment="vim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601446" comment="vim-data-8.0.1568-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151194" comment="vim-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601447" comment="vim-data-common-8.0.1568-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12746</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12746" ref_url="https://www.suse.com/security/cve/CVE-2019-12746" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) Community Edition 5.0.x through 5.0.36 and 6.0.x through 6.0.19. A user logged into OTRS as an agent might unknowingly disclose their session ID by sharing the link of an embedded ticket article with third parties. This identifier can be then be potentially abused in order to impersonate the agent user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12746/">CVE-2019-12746</cve>
	<bugzilla href="https://bugzilla.suse.com/1141430">SUSE bug 1141430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006978.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html" source="SUSE-SU"/>
    <description>
    dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601672" comment="dbus-1-1.12.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601673" comment="dbus-1-devel-1.12.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151536" comment="dbus-1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601674" comment="dbus-1-devel-32bit-1.12.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258222" comment="dbus-1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601675" comment="dbus-1-devel-doc-1.12.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009258223" comment="dbus-1-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601676" comment="dbus-1-x11-1.12.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601677" comment="libdbus-1-3-1.12.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601678" comment="libdbus-1-3-32bit-1.12.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151539" comment="libdbus-1-3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12779</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12779" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12779" ref_url="https://www.suse.com/security/cve/CVE-2019-12779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1891-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html" source="SUSE-SU"/>
    <description>
    libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12779/">CVE-2019-12779</cve>
	<bugzilla href="https://bugzilla.suse.com/1137835">SUSE bug 1137835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601682" comment="libqb-devel-1.0.3+20190326.a521604-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260152" comment="libqb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601683" comment="libqb-devel-32bit-1.0.3+20190326.a521604-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260153" comment="libqb-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601684" comment="libqb-tests-1.0.3+20190326.a521604-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266846" comment="libqb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601685" comment="libqb-tools-1.0.3+20190326.a521604-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266847" comment="libqb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601686" comment="libqb20-1.0.3+20190326.a521604-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266848" comment="libqb20 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601687" comment="libqb20-32bit-1.0.3+20190326.a521604-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266849" comment="libqb20-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12781" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12781" ref_url="https://www.suse.com/security/cve/CVE-2019-12781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12781/">CVE-2019-12781</cve>
	<bugzilla href="https://bugzilla.suse.com/1124991">SUSE bug 1124991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139945">SUSE bug 1139945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602031" comment="python3-Django-2.2.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173965" comment="python3-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12795</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12795" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12795" ref_url="https://www.suse.com/security/cve/CVE-2019-12795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00008.html" source="SUSE-SU"/>
    <description>
    daemon/gvfsdaemon.c in gvfsd from GNOME gvfs before 1.38.3, 1.40.x before 1.40.2, and 1.41.x before 1.41.3 opened a private D-Bus server socket without configuring an authorization rule. A local attacker could connect to this server socket and issue D-Bus method calls. (Note that the server socket only accepts a single connection, so the attacker would have to discover the server and connect to the socket before its owner does.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12795/">CVE-2019-12795</cve>
	<bugzilla href="https://bugzilla.suse.com/1137930">SUSE bug 1137930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601659" comment="gvfs-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245313" comment="gvfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601660" comment="gvfs-32bit-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245314" comment="gvfs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601661" comment="gvfs-backend-afc-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245315" comment="gvfs-backend-afc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601662" comment="gvfs-backend-samba-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245316" comment="gvfs-backend-samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601663" comment="gvfs-backends-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245317" comment="gvfs-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601664" comment="gvfs-devel-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245318" comment="gvfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601665" comment="gvfs-fuse-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245319" comment="gvfs-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601666" comment="gvfs-lang-1.34.2.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245320" comment="gvfs-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12815</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12815" ref_url="https://www.suse.com/security/cve/CVE-2019-12815" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1836-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html" source="SUSE-SU"/>
    <description>
    An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-12815/">CVE-2019-12815</cve>
	<bugzilla href="https://bugzilla.suse.com/1142281">SUSE bug 1142281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609637" comment="proftpd-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153640" comment="proftpd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609638" comment="proftpd-devel-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153641" comment="proftpd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609639" comment="proftpd-doc-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153642" comment="proftpd-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609640" comment="proftpd-lang-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153643" comment="proftpd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609641" comment="proftpd-ldap-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153644" comment="proftpd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609642" comment="proftpd-mysql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153645" comment="proftpd-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609643" comment="proftpd-pgsql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153646" comment="proftpd-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609644" comment="proftpd-radius-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153647" comment="proftpd-radius is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609645" comment="proftpd-sqlite-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153648" comment="proftpd-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12816</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12816" ref_url="https://www.suse.com/security/cve/CVE-2019-12816" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Modules.cpp in ZNC before 1.7.4-rc1 allows remote authenticated non-admin users to escalate privileges and execute arbitrary code by loading a module with a crafted name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-12816/">CVE-2019-12816</cve>
	<bugzilla href="https://bugzilla.suse.com/1138572">SUSE bug 1138572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609741" comment="znc-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251916" comment="znc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609742" comment="znc-devel-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251918" comment="znc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609743" comment="znc-lang-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251920" comment="znc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609744" comment="znc-perl-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251922" comment="znc-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609745" comment="znc-python3-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251924" comment="znc-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609746" comment="znc-tcl-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251926" comment="znc-tcl is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12817</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12817" ref_url="https://www.suse.com/security/cve/CVE-2019-12817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-12817/">CVE-2019-12817</cve>
	<bugzilla href="https://bugzilla.suse.com/1138263">SUSE bug 1138263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138264">SUSE bug 1138264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601814" comment="kernel-debug-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601815" comment="kernel-debug-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601816" comment="kernel-debug-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601817" comment="kernel-default-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601818" comment="kernel-default-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601819" comment="kernel-default-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601820" comment="kernel-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601821" comment="kernel-docs-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601822" comment="kernel-docs-html-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601823" comment="kernel-kvmsmall-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601824" comment="kernel-kvmsmall-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601825" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601826" comment="kernel-macros-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601827" comment="kernel-obs-build-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601828" comment="kernel-obs-qa-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601829" comment="kernel-source-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601830" comment="kernel-source-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601831" comment="kernel-syms-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601832" comment="kernel-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601833" comment="kernel-vanilla-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601834" comment="kernel-vanilla-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12818</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12818" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<bugzilla href="https://bugzilla.suse.com/1138293">SUSE bug 1138293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12819</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12838</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12838" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12838" ref_url="https://www.suse.com/security/cve/CVE-2019-12838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00038.html" source="SUSE-SU"/>
    <description>
    SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12838/">CVE-2019-12838</cve>
	<bugzilla href="https://bugzilla.suse.com/1140709">SUSE bug 1140709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608980" comment="libpmi0-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608981" comment="libslurm33-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266850" comment="libslurm33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608982" comment="perl-slurm-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608983" comment="slurm-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608984" comment="slurm-auth-none-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608985" comment="slurm-config-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608986" comment="slurm-config-man-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608987" comment="slurm-cray-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608988" comment="slurm-devel-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608989" comment="slurm-doc-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608990" comment="slurm-hdf5-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608991" comment="slurm-lua-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608992" comment="slurm-munge-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608993" comment="slurm-node-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608994" comment="slurm-openlava-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608995" comment="slurm-pam_slurm-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608996" comment="slurm-plugins-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608997" comment="slurm-seff-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608998" comment="slurm-sjstat-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608999" comment="slurm-slurmdbd-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609000" comment="slurm-sql-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609001" comment="slurm-sview-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609002" comment="slurm-torque-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609003" comment="slurm-webdoc-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12854</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12854" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12854" ref_url="https://www.suse.com/security/cve/CVE-2019-12854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    Due to incorrect string termination, Squid cachemgr.cgi 4.0 through 4.7 may access unallocated memory. On systems with memory access protections, this can cause the CGI process to terminate unexpectedly, resulting in a denial of service for all clients using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12854/">CVE-2019-12854</cve>
	<bugzilla href="https://bugzilla.suse.com/1141442">SUSE bug 1141442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12855</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12855" ref_url="https://www.suse.com/security/cve/CVE-2019-12855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00028.html" source="SUSE-SU"/>
    <description>
    In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12855/">CVE-2019-12855</cve>
	<bugzilla href="https://bugzilla.suse.com/1138461">SUSE bug 1138461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602639" comment="python-Twisted-doc-17.9.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153552" comment="python-Twisted-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602640" comment="python2-Twisted-17.9.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260377" comment="python2-Twisted is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602641" comment="python3-Twisted-17.9.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260379" comment="python3-Twisted is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12874</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12874" ref_url="https://www.suse.com/security/cve/CVE-2019-12874" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in zlib_decompress_extra in modules/demux/mkv/util.cpp in VideoLAN VLC media player 3.x through 3.0.7. The Matroska demuxer, while parsing a malformed MKV file type, has a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-12874/">CVE-2019-12874</cve>
	<bugzilla href="https://bugzilla.suse.com/1138933">SUSE bug 1138933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602032" comment="libvlc5-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602033" comment="libvlccore9-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602034" comment="vlc-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602035" comment="vlc-codec-gstreamer-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602036" comment="vlc-devel-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602037" comment="vlc-jack-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602038" comment="vlc-lang-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602039" comment="vlc-noX-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602040" comment="vlc-qt-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602041" comment="vlc-vdpau-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12900</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2004-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192004-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1781-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1918-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602138" comment="bzip2-1.0.6-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151380" comment="bzip2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602139" comment="bzip2-doc-1.0.6-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253604" comment="bzip2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602140" comment="libbz2-1-1.0.6-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151382" comment="libbz2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602141" comment="libbz2-1-32bit-1.0.6-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151383" comment="libbz2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602142" comment="libbz2-devel-1.0.6-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151384" comment="libbz2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602143" comment="libbz2-devel-32bit-1.0.6-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253605" comment="libbz2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603812" comment="libclamav7-0.100.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231590" comment="libclamav7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603813" comment="libclammspack0-0.100.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231591" comment="libclammspack0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12904</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12904" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12904" ref_url="https://www.suse.com/security/cve/CVE-2019-12904" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005751.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00049.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12904/">CVE-2019-12904</cve>
	<bugzilla href="https://bugzilla.suse.com/1138939">SUSE bug 1138939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609747" comment="libgcrypt-cavs-1.8.2-lp151.9.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153048" comment="libgcrypt-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609748" comment="libgcrypt-devel-1.8.2-lp151.9.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151920" comment="libgcrypt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609749" comment="libgcrypt-devel-32bit-1.8.2-lp151.9.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153049" comment="libgcrypt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609750" comment="libgcrypt20-1.8.2-lp151.9.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151921" comment="libgcrypt20 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609751" comment="libgcrypt20-32bit-1.8.2-lp151.9.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151922" comment="libgcrypt20-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609752" comment="libgcrypt20-hmac-1.8.2-lp151.9.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153050" comment="libgcrypt20-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609753" comment="libgcrypt20-hmac-32bit-1.8.2-lp151.9.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153051" comment="libgcrypt20-hmac-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12921</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12921" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12921" ref_url="https://www.suse.com/security/cve/CVE-2019-12921" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick before 1.3.32, the text filename component allows remote attackers to read arbitrary files via a crafted image because of TranslateTextEx for SVG.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12921/">CVE-2019-12921</cve>
	<bugzilla href="https://bugzilla.suse.com/1138425">SUSE bug 1138425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167208">SUSE bug 1167208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607322" comment="GraphicsMagick-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607323" comment="GraphicsMagick-devel-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607324" comment="libGraphicsMagick++-Q16-12-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607325" comment="libGraphicsMagick++-devel-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607326" comment="libGraphicsMagick-Q16-3-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607327" comment="libGraphicsMagick3-config-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607328" comment="libGraphicsMagickWand-Q16-2-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607329" comment="perl-GraphicsMagick-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12922</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12922" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12922" ref_url="https://www.suse.com/security/cve/CVE-2019-12922" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html" source="SUSE-SU"/>
    <description>
    A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12922/">CVE-2019-12922</cve>
	<bugzilla href="https://bugzilla.suse.com/1150914">SUSE bug 1150914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609754" comment="phpMyAdmin-4.9.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12972</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972</cve>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605845" comment="binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605846" comment="binutils-devel-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605847" comment="binutils-devel-32bit-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605848" comment="binutils-gold-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605849" comment="cross-aarch64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605850" comment="cross-arm-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605851" comment="cross-avr-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605852" comment="cross-epiphany-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605853" comment="cross-hppa-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605854" comment="cross-hppa64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605855" comment="cross-i386-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605856" comment="cross-ia64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605857" comment="cross-m68k-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605858" comment="cross-mips-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605859" comment="cross-ppc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605860" comment="cross-ppc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605861" comment="cross-ppc64le-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605862" comment="cross-riscv64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605863" comment="cross-rx-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605864" comment="cross-s390-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605865" comment="cross-s390x-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605866" comment="cross-sparc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605867" comment="cross-sparc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605868" comment="cross-spu-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605869" comment="libctf-nobfd0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605870" comment="libctf0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603086" comment="ghostscript-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603087" comment="ghostscript-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603088" comment="ghostscript-mini-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603089" comment="ghostscript-mini-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603090" comment="ghostscript-x11-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974</cve>
	<bugzilla href="https://bugzilla.suse.com/1140111">SUSE bug 1140111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12975</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975</cve>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12976</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976</cve>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12977</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12977" ref_url="https://www.suse.com/security/cve/CVE-2019-12977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12977/">CVE-2019-12977</cve>
	<bugzilla href="https://bugzilla.suse.com/1139884">SUSE bug 1139884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12978</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978</cve>
	<bugzilla href="https://bugzilla.suse.com/1139885">SUSE bug 1139885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12979</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979</cve>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13045</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13045" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13045" ref_url="https://www.suse.com/security/cve/CVE-2019-13045" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when SASL is enabled, has a use after free when sending SASL login to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13045/">CVE-2019-13045</cve>
	<bugzilla href="https://bugzilla.suse.com/1139802">SUSE bug 1139802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609755" comment="irssi-1.1.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151315" comment="irssi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609756" comment="irssi-devel-1.1.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153798" comment="irssi-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13050</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2006-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192006-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1917-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html" source="SUSE-SU"/>
    <description>
    Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050</cve>
	<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602136" comment="gpg2-2.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602137" comment="gpg2-lang-2.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13057</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13057" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602825" comment="libldap-2_4-2-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602826" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602827" comment="libldap-data-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602828" comment="openldap2-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602829" comment="openldap2-back-meta-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602830" comment="openldap2-back-perl-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602831" comment="openldap2-back-sock-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602832" comment="openldap2-back-sql-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602833" comment="openldap2-client-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602834" comment="openldap2-contrib-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602835" comment="openldap2-devel-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602836" comment="openldap2-devel-32bit-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602837" comment="openldap2-devel-static-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602838" comment="openldap2-doc-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602839" comment="openldap2-ppolicy-check-password-1.2-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13103</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13103" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13103" ref_url="https://www.suse.com/security/cve/CVE-2019-13103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    A crafted self-referential DOS partition table will cause all Das U-Boot versions through 2019.07-rc4 to infinitely recurse, causing the stack to grow infinitely and eventually either crash or overwrite other data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-13103/">CVE-2019-13103</cve>
	<bugzilla href="https://bugzilla.suse.com/1143463">SUSE bug 1143463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13104</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13104" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13104" ref_url="https://www.suse.com/security/cve/CVE-2019-13104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00004.html" source="SUSE-SU"/>
    <description>
    In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow can cause memcpy() to overwrite a very large amount of data (including the whole stack) while reading a crafted ext4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-13104/">CVE-2019-13104</cve>
	<bugzilla href="https://bugzilla.suse.com/1144675">SUSE bug 1144675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603115" comment="u-boot-tools-2019.01-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13106</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13106" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13106" ref_url="https://www.suse.com/security/cve/CVE-2019-13106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00004.html" source="SUSE-SU"/>
    <description>
    Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-13106/">CVE-2019-13106</cve>
	<bugzilla href="https://bugzilla.suse.com/1144656">SUSE bug 1144656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603115" comment="u-boot-tools-2019.01-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13114</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13114" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13114" ref_url="https://www.suse.com/security/cve/CVE-2019-13114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13114/">CVE-2019-13114</cve>
	<bugzilla href="https://bugzilla.suse.com/1142684">SUSE bug 1142684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607420" comment="exiv2-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607421" comment="exiv2-lang-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607422" comment="libexiv2-26-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177206" comment="libexiv2-26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607423" comment="libexiv2-26-32bit-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230276" comment="libexiv2-26-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607424" comment="libexiv2-devel-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607425" comment="libexiv2-doc-0.26-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230277" comment="libexiv2-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13117</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html" source="SUSE-SU"/>
    <description>
    In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117</cve>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608185" comment="libxslt-devel-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608186" comment="libxslt-devel-32bit-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155745" comment="libxslt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608187" comment="libxslt-python-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155746" comment="libxslt-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608188" comment="libxslt-tools-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608189" comment="libxslt1-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608190" comment="libxslt1-32bit-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155749" comment="libxslt1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13118</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13118" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html" source="SUSE-SU"/>
    <description>
    In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118</cve>
	<bugzilla href="https://bugzilla.suse.com/1140101">SUSE bug 1140101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608185" comment="libxslt-devel-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608186" comment="libxslt-devel-32bit-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155745" comment="libxslt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608187" comment="libxslt-python-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155746" comment="libxslt-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608188" comment="libxslt-tools-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608189" comment="libxslt1-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608190" comment="libxslt1-32bit-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155749" comment="libxslt1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13132</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13132" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005675.html" source="SUSE-SU"/>
		<reference ref_id="TID000019475" ref_url="https://www.suse.com/support/kb/doc/?id=000019475" source="SUSE-SU"/>
		<reference ref_id="TID7023929" ref_url="https://www.suse.com/support/kb/doc/?id=7023929" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132</cve>
	<bugzilla href="https://bugzilla.suse.com/1140255">SUSE bug 1140255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601853" comment="libzmq5-4.2.3-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243098" comment="libzmq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601854" comment="zeromq-devel-4.2.3-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243101" comment="zeromq-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601855" comment="zeromq-tools-4.2.3-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243102" comment="zeromq-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13133</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133</cve>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13134</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13134" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134</cve>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13135</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135</cve>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13136</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13136" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13136" ref_url="https://www.suse.com/security/cve/CVE-2019-13136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13136/">CVE-2019-13136</cve>
	<bugzilla href="https://bugzilla.suse.com/1140104">SUSE bug 1140104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13137</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13137" ref_url="https://www.suse.com/security/cve/CVE-2019-13137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13137/">CVE-2019-13137</cve>
	<bugzilla href="https://bugzilla.suse.com/1140105">SUSE bug 1140105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html" source="SUSE-SU"/>
    <description>
    qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602543" comment="qemu-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602544" comment="qemu-arm-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602545" comment="qemu-audio-alsa-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602546" comment="qemu-audio-oss-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602547" comment="qemu-audio-pa-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602548" comment="qemu-audio-sdl-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602549" comment="qemu-block-curl-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602550" comment="qemu-block-dmg-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602551" comment="qemu-block-gluster-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602552" comment="qemu-block-iscsi-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602553" comment="qemu-block-nfs-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602554" comment="qemu-block-rbd-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602555" comment="qemu-block-ssh-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602556" comment="qemu-extra-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602557" comment="qemu-guest-agent-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602558" comment="qemu-ipxe-1.0.0+-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602559" comment="qemu-ksm-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602560" comment="qemu-kvm-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602561" comment="qemu-lang-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602562" comment="qemu-linux-user-3.1.1-lp151.7.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602563" comment="qemu-ppc-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602564" comment="qemu-s390-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602565" comment="qemu-seabios-1.12.0-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602566" comment="qemu-sgabios-8-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602567" comment="qemu-testsuite-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602568" comment="qemu-tools-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602569" comment="qemu-ui-curses-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602570" comment="qemu-ui-gtk-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602571" comment="qemu-ui-sdl-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602572" comment="qemu-vgabios-1.12.0-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602573" comment="qemu-x86-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13173</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html" source="SUSE-SU"/>
    <description>
    fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173</cve>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602048" comment="nodejs10-10.16.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602049" comment="nodejs10-devel-10.16.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602050" comment="nodejs10-docs-10.16.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602071" comment="nodejs8-8.15.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602072" comment="nodejs8-devel-8.15.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602073" comment="nodejs8-docs-8.15.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602051" comment="npm10-10.16.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602074" comment="npm8-8.15.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13178</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13178" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13178" ref_url="https://www.suse.com/security/cve/CVE-2019-13178" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2654-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00020.html" source="SUSE-SU"/>
    <description>
    modules/luksbootkeyfile/main.py in Calamares versions 3.1 through 3.2.10 has a race condition between the time when the LUKS encryption keyfile is created and when secure permissions are set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13178/">CVE-2019-13178</cve>
	<bugzilla href="https://bugzilla.suse.com/1140256">SUSE bug 1140256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603856" comment="calamares-3.2.15-lp151.4.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273029" comment="calamares is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603857" comment="calamares-branding-upstream-3.2.15-lp151.4.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273031" comment="calamares-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603858" comment="calamares-webview-3.2.15-lp151.4.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273033" comment="calamares-webview is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13207</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13207" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13207" ref_url="https://www.suse.com/security/cve/CVE-2019-13207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FIDKYB6WSN55OA36HXF3BL4UYWBXAEV/" source="SUSE-SU"/>
    <description>
    nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13207/">CVE-2019-13207</cve>
	<bugzilla href="https://bugzilla.suse.com/1182952">SUSE bug 1182952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609757" comment="nsd-4.1.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338518" comment="nsd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13233</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13233" ref_url="https://www.suse.com/security/cve/CVE-2019-13233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13233/">CVE-2019-13233</cve>
	<bugzilla href="https://bugzilla.suse.com/1140454">SUSE bug 1140454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144502">SUSE bug 1144502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601814" comment="kernel-debug-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601815" comment="kernel-debug-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601816" comment="kernel-debug-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601817" comment="kernel-default-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601818" comment="kernel-default-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601819" comment="kernel-default-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601820" comment="kernel-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601821" comment="kernel-docs-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601822" comment="kernel-docs-html-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601823" comment="kernel-kvmsmall-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601824" comment="kernel-kvmsmall-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601825" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601826" comment="kernel-macros-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601827" comment="kernel-obs-build-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601828" comment="kernel-obs-qa-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601829" comment="kernel-source-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601830" comment="kernel-source-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601831" comment="kernel-syms-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601832" comment="kernel-vanilla-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601833" comment="kernel-vanilla-base-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601834" comment="kernel-vanilla-devel-4.12.14-lp151.28.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13295</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295</cve>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13296</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13296" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13296" ref_url="https://www.suse.com/security/cve/CVE-2019-13296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13296/">CVE-2019-13296</cve>
	<bugzilla href="https://bugzilla.suse.com/1140665">SUSE bug 1140665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13297</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297</cve>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13298</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13298" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13298" ref_url="https://www.suse.com/security/cve/CVE-2019-13298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13298/">CVE-2019-13298</cve>
	<bugzilla href="https://bugzilla.suse.com/1140667">SUSE bug 1140667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13299</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13299" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13299" ref_url="https://www.suse.com/security/cve/CVE-2019-13299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13299/">CVE-2019-13299</cve>
	<bugzilla href="https://bugzilla.suse.com/1140668">SUSE bug 1140668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13300</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300</cve>
	<bugzilla href="https://bugzilla.suse.com/1140669">SUSE bug 1140669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13301</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301</cve>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13302</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13302" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13302" ref_url="https://www.suse.com/security/cve/CVE-2019-13302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13302/">CVE-2019-13302</cve>
	<bugzilla href="https://bugzilla.suse.com/1140552">SUSE bug 1140552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13303</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13303" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13303" ref_url="https://www.suse.com/security/cve/CVE-2019-13303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13303/">CVE-2019-13303</cve>
	<bugzilla href="https://bugzilla.suse.com/1140549">SUSE bug 1140549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13304</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304</cve>
	<bugzilla href="https://bugzilla.suse.com/1140547">SUSE bug 1140547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13305</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305</cve>
	<bugzilla href="https://bugzilla.suse.com/1140545">SUSE bug 1140545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13306</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306</cve>
	<bugzilla href="https://bugzilla.suse.com/1140543">SUSE bug 1140543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13307</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307</cve>
	<bugzilla href="https://bugzilla.suse.com/1140538">SUSE bug 1140538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13308</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308</cve>
	<bugzilla href="https://bugzilla.suse.com/1140534">SUSE bug 1140534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13309</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13310</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13311</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311</cve>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13314</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13314" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13314" ref_url="https://www.suse.com/security/cve/CVE-2019-13314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1787-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00026.html" source="SUSE-SU"/>
    <description>
    virt-bootstrap 1.1.0 allows local users to discover a root password by listing a process, because this password may be present in the --root-password option to virt_bootstrap.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13314/">CVE-2019-13314</cve>
	<bugzilla href="https://bugzilla.suse.com/1140750">SUSE bug 1140750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606010" comment="python2-virt-bootstrap-1.0.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297785" comment="python2-virt-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606011" comment="python3-virt-bootstrap-1.0.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297786" comment="python3-virt-bootstrap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13345</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13345" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2089-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13377</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13377" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377</cve>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13391</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13391" ref_url="https://www.suse.com/security/cve/CVE-2019-13391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13391/">CVE-2019-13391</cve>
	<bugzilla href="https://bugzilla.suse.com/1140673">SUSE bug 1140673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13454</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454</cve>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602490" comment="ImageMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602491" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602492" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602493" comment="ImageMagick-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602494" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602495" comment="ImageMagick-doc-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602496" comment="ImageMagick-extra-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602497" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602498" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602499" comment="libMagick++-devel-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602500" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602501" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602502" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602503" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602504" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602505" comment="perl-PerlMagick-7.0.7.34-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13456</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13456" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007316.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html" source="SUSE-SU"/>
    <description>
    In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456</cve>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166858">SUSE bug 1166858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607602" comment="freeradius-server-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157108" comment="freeradius-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607603" comment="freeradius-server-devel-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157109" comment="freeradius-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607604" comment="freeradius-server-doc-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157110" comment="freeradius-server-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607605" comment="freeradius-server-krb5-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157111" comment="freeradius-server-krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607606" comment="freeradius-server-ldap-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157112" comment="freeradius-server-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607607" comment="freeradius-server-libs-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157113" comment="freeradius-server-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607608" comment="freeradius-server-mysql-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157114" comment="freeradius-server-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607609" comment="freeradius-server-perl-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157115" comment="freeradius-server-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607610" comment="freeradius-server-postgresql-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157116" comment="freeradius-server-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607611" comment="freeradius-server-python-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157117" comment="freeradius-server-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607612" comment="freeradius-server-sqlite-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157118" comment="freeradius-server-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607613" comment="freeradius-server-utils-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157119" comment="freeradius-server-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13457</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13457" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13457" ref_url="https://www.suse.com/security/cve/CVE-2019-13457" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8. A customer user can use the search results to disclose information from their "company" tickets (with the same CustomerID), even when the CustomerDisableCompanyTicketAccess setting is turned on.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13457/">CVE-2019-13457</cve>
	<bugzilla href="https://bugzilla.suse.com/1141431">SUSE bug 1141431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13458</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13458" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13458" ref_url="https://www.suse.com/security/cve/CVE-2019-13458" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, and Community Edition 5.0.x through 5.0.36 and 6.0.x through 6.0.19. An attacker who is logged into OTRS as an agent user with appropriate permissions can leverage OTRS notification tags in templates in order to disclose hashed user passwords.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13458/">CVE-2019-13458</cve>
	<bugzilla href="https://bugzilla.suse.com/1141431">SUSE bug 1141431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141432">SUSE bug 1141432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1348</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it allows overwriting arbitrary paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604916" comment="perl-Authen-SASL-2.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277151" comment="perl-Authen-SASL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604917" comment="perl-Net-SMTP-SSL-1.04-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277152" comment="perl-Net-SMTP-SSL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1349</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604916" comment="perl-Authen-SASL-2.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277151" comment="perl-Authen-SASL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604917" comment="perl-Net-SMTP-SSL-1.04-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277152" comment="perl-Net-SMTP-SSL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1350</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604916" comment="perl-Authen-SASL-2.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277151" comment="perl-Authen-SASL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604917" comment="perl-Net-SMTP-SSL-1.04-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277152" comment="perl-Net-SMTP-SSL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13508</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13508" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13508" ref_url="https://www.suse.com/security/cve/CVE-2019-13508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1417-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00067.html" source="SUSE-SU"/>
    <description>
    FreeTDS through 1.1.11 has a Buffer Overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13508/">CVE-2019-13508</cve>
	<bugzilla href="https://bugzilla.suse.com/1141132">SUSE bug 1141132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608202" comment="freetds-config-1.1.36-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284105" comment="freetds-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608203" comment="freetds-devel-1.1.36-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284106" comment="freetds-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608204" comment="freetds-doc-1.1.36-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284107" comment="freetds-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608205" comment="freetds-tools-1.1.36-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284108" comment="freetds-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608206" comment="libct4-1.1.36-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284109" comment="libct4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608207" comment="libsybdb5-1.1.36-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284110" comment="libsybdb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608208" comment="libtdsodbc0-1.1.36-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284111" comment="libtdsodbc0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13509</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13509" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13509" ref_url="https://www.suse.com/security/cve/CVE-2019-13509" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html" source="SUSE-SU"/>
    <description>
    In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13509/">CVE-2019-13509</cve>
	<bugzilla href="https://bugzilla.suse.com/1142160">SUSE bug 1142160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602528" comment="containerd-1.2.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602529" comment="containerd-ctr-1.2.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602530" comment="docker-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602531" comment="docker-bash-completion-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602532" comment="docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602533" comment="docker-runc-1.0.0rc8+gitr3826_425e105d5a03-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602534" comment="docker-test-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602535" comment="docker-zsh-completion-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602536" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1351</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604916" comment="perl-Authen-SASL-2.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277151" comment="perl-Authen-SASL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604917" comment="perl-Net-SMTP-SSL-1.04-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277152" comment="perl-Net-SMTP-SSL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1352</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604916" comment="perl-Authen-SASL-2.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277151" comment="perl-Authen-SASL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604917" comment="perl-Net-SMTP-SSL-1.04-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277152" comment="perl-Net-SMTP-SSL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1353</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as "WSL") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604916" comment="perl-Authen-SASL-2.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277151" comment="perl-Authen-SASL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604917" comment="perl-Net-SMTP-SSL-1.04-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277152" comment="perl-Net-SMTP-SSL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1354</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604916" comment="perl-Authen-SASL-2.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277151" comment="perl-Authen-SASL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604917" comment="perl-Net-SMTP-SSL-1.04-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277152" comment="perl-Net-SMTP-SSL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13565</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602825" comment="libldap-2_4-2-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602826" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602827" comment="libldap-data-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602828" comment="openldap2-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602829" comment="openldap2-back-meta-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602830" comment="openldap2-back-perl-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602831" comment="openldap2-back-sock-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602832" comment="openldap2-back-sql-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602833" comment="openldap2-client-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602834" comment="openldap2-contrib-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602835" comment="openldap2-devel-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602836" comment="openldap2-devel-32bit-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602837" comment="openldap2-devel-static-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602838" comment="openldap2-doc-2.4.46-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602839" comment="openldap2-ppolicy-check-password-1.2-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13602</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13602" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13602" ref_url="https://www.suse.com/security/cve/CVE-2019-13602" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    An Integer Underflow in MP4_EIA608_Convert() in modules/demux/mp4/mp4.c in VideoLAN VLC media player through 3.0.7.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and crash) or possibly have unspecified other impact via a crafted .mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13602/">CVE-2019-13602</cve>
	<bugzilla href="https://bugzilla.suse.com/1141522">SUSE bug 1141522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13616</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13616" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2463-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFAVEMB6RSGK626NYU5HGZQL46KEPIB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGSHRLXRLM6QT7N73JKYMSATV36M64Q6/" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit in video/SDL_blit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616</cve>
	<bugzilla href="https://bugzilla.suse.com/1141844">SUSE bug 1141844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606213" comment="libSDL-1_2-0-1.2.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251318" comment="libSDL-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606214" comment="libSDL-1_2-0-32bit-1.2.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251319" comment="libSDL-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606215" comment="libSDL-devel-1.2.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251320" comment="libSDL-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606216" comment="libSDL-devel-32bit-1.2.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251321" comment="libSDL-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603091" comment="libSDL2-2_0-0-2.0.8-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166226" comment="libSDL2-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603092" comment="libSDL2-2_0-0-32bit-2.0.8-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166228" comment="libSDL2-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603093" comment="libSDL2-devel-2.0.8-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166230" comment="libSDL2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603094" comment="libSDL2-devel-32bit-2.0.8-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166232" comment="libSDL2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602646" comment="libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172250" comment="libSDL_image-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602647" comment="libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172251" comment="libSDL_image-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602648" comment="libSDL_image-devel-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172252" comment="libSDL_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602649" comment="libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172253" comment="libSDL_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13619</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13619" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13619" ref_url="https://www.suse.com/security/cve/CVE-2019-13619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ASN.1 BER dissector and related dissectors could crash. This was addressed in epan/asn1.c by properly restricting buffer increments.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13619/">CVE-2019-13619</cve>
	<bugzilla href="https://bugzilla.suse.com/1141980">SUSE bug 1141980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602483" comment="libwireshark9-2.4.16-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177715" comment="libwireshark9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602484" comment="libwiretap7-2.4.16-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177716" comment="libwiretap7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602485" comment="libwscodecs1-2.4.16-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177717" comment="libwscodecs1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602486" comment="libwsutil8-2.4.16-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177718" comment="libwsutil8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13626</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13626" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13626" ref_url="https://www.suse.com/security/cve/CVE-2019-13626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2463-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) 2.x through 2.0.9 has a heap-based buffer over-read in Fill_IMA_ADPCM_block, caused by an integer overflow in IMA_ADPCM_decode() in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13626/">CVE-2019-13626</cve>
	<bugzilla href="https://bugzilla.suse.com/1142031">SUSE bug 1142031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603091" comment="libSDL2-2_0-0-2.0.8-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166226" comment="libSDL2-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603092" comment="libSDL2-2_0-0-32bit-2.0.8-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166228" comment="libSDL2-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603093" comment="libSDL2-devel-2.0.8-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166230" comment="libSDL2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603094" comment="libSDL2-devel-32bit-2.0.8-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166232" comment="libSDL2-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13627</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006291.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html" source="SUSE-SU"/>
    <description>
    It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606724" comment="libgcrypt-cavs-1.8.2-lp151.9.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153048" comment="libgcrypt-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606725" comment="libgcrypt-devel-1.8.2-lp151.9.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151920" comment="libgcrypt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606726" comment="libgcrypt-devel-32bit-1.8.2-lp151.9.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153049" comment="libgcrypt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606727" comment="libgcrypt20-1.8.2-lp151.9.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151921" comment="libgcrypt20 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606728" comment="libgcrypt20-32bit-1.8.2-lp151.9.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151922" comment="libgcrypt20-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606729" comment="libgcrypt20-hmac-1.8.2-lp151.9.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153050" comment="libgcrypt20-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606730" comment="libgcrypt20-hmac-32bit-1.8.2-lp151.9.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153051" comment="libgcrypt20-hmac-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13631</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602144" comment="kernel-debug-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602145" comment="kernel-debug-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602146" comment="kernel-debug-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602147" comment="kernel-default-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602148" comment="kernel-default-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602149" comment="kernel-default-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602150" comment="kernel-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602151" comment="kernel-docs-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602152" comment="kernel-docs-html-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602153" comment="kernel-kvmsmall-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602154" comment="kernel-kvmsmall-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602155" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602156" comment="kernel-macros-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602157" comment="kernel-obs-build-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602158" comment="kernel-obs-qa-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602159" comment="kernel-source-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602160" comment="kernel-source-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602161" comment="kernel-syms-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602162" comment="kernel-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602163" comment="kernel-vanilla-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602164" comment="kernel-vanilla-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13640</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13640" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13640" ref_url="https://www.suse.com/security/cve/CVE-2019-13640" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00085.html" source="SUSE-SU"/>
    <description>
    In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13640/">CVE-2019-13640</cve>
	<bugzilla href="https://bugzilla.suse.com/1141967">SUSE bug 1141967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602526" comment="qbittorrent-4.1.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154048" comment="qbittorrent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602527" comment="qbittorrent-nox-4.1.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154049" comment="qbittorrent-nox is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13648</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648</cve>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142265">SUSE bug 1142265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602144" comment="kernel-debug-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602145" comment="kernel-debug-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602146" comment="kernel-debug-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602147" comment="kernel-default-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602148" comment="kernel-default-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602149" comment="kernel-default-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602150" comment="kernel-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602151" comment="kernel-docs-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602152" comment="kernel-docs-html-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602153" comment="kernel-kvmsmall-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602154" comment="kernel-kvmsmall-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602155" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602156" comment="kernel-macros-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602157" comment="kernel-obs-build-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602158" comment="kernel-obs-qa-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602159" comment="kernel-source-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602160" comment="kernel-source-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602161" comment="kernel-syms-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602162" comment="kernel-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602163" comment="kernel-vanilla-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602164" comment="kernel-vanilla-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13659" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13659" ref_url="https://www.suse.com/security/cve/CVE-2019-13659" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13659/">CVE-2019-13659</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13660</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13660" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13660" ref_url="https://www.suse.com/security/cve/CVE-2019-13660" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13660/">CVE-2019-13660</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13661</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13661" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13661" ref_url="https://www.suse.com/security/cve/CVE-2019-13661" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13661/">CVE-2019-13661</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13662</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13662" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13662" ref_url="https://www.suse.com/security/cve/CVE-2019-13662" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigations in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13662/">CVE-2019-13662</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13663</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13663" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13663" ref_url="https://www.suse.com/security/cve/CVE-2019-13663" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13663/">CVE-2019-13663</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13664</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13664" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13664" ref_url="https://www.suse.com/security/cve/CVE-2019-13664" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13664/">CVE-2019-13664</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13665</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13665" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13665" ref_url="https://www.suse.com/security/cve/CVE-2019-13665" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient filtering in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass multiple file download protection via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13665/">CVE-2019-13665</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13666</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13666" ref_url="https://www.suse.com/security/cve/CVE-2019-13666" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Information leak in storage in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13666/">CVE-2019-13666</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13667</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13667" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13667" ref_url="https://www.suse.com/security/cve/CVE-2019-13667" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13667/">CVE-2019-13667</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13668</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13668" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13668" ref_url="https://www.suse.com/security/cve/CVE-2019-13668" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13668/">CVE-2019-13668</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13669</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13669" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13669" ref_url="https://www.suse.com/security/cve/CVE-2019-13669" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Incorrect data validation in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13669/">CVE-2019-13669</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13670</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13670" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13670" ref_url="https://www.suse.com/security/cve/CVE-2019-13670" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13670/">CVE-2019-13670</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13671</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13671" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13671" ref_url="https://www.suse.com/security/cve/CVE-2019-13671" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    UI spoofing in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13671/">CVE-2019-13671</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13673" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13673" ref_url="https://www.suse.com/security/cve/CVE-2019-13673" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13673/">CVE-2019-13673</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13674" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13674" ref_url="https://www.suse.com/security/cve/CVE-2019-13674" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13674/">CVE-2019-13674</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13675</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13675" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13675" ref_url="https://www.suse.com/security/cve/CVE-2019-13675" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in extensions in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to disable extensions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13675/">CVE-2019-13675</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13676" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13676" ref_url="https://www.suse.com/security/cve/CVE-2019-13676" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13676/">CVE-2019-13676</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13677</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13677" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13677" ref_url="https://www.suse.com/security/cve/CVE-2019-13677" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in site isolation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13677/">CVE-2019-13677</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13678" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13678" ref_url="https://www.suse.com/security/cve/CVE-2019-13678" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Incorrect data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13678/">CVE-2019-13678</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13679</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13679" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13679" ref_url="https://www.suse.com/security/cve/CVE-2019-13679" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in PDFium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to show print dialogs via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13679/">CVE-2019-13679</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13680</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13680" ref_url="https://www.suse.com/security/cve/CVE-2019-13680" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in TLS in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof client IP address to websites via crafted TLS connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13680/">CVE-2019-13680</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13681</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13681" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13681" ref_url="https://www.suse.com/security/cve/CVE-2019-13681" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass download restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13681/">CVE-2019-13681</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13682</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13682" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13682" ref_url="https://www.suse.com/security/cve/CVE-2019-13682" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in external protocol handling in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13682/">CVE-2019-13682</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13683</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13683" ref_url="https://www.suse.com/security/cve/CVE-2019-13683" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13683/">CVE-2019-13683</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13685</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13685" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13685" ref_url="https://www.suse.com/security/cve/CVE-2019-13685" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-13685/">CVE-2019-13685</cve>
	<bugzilla href="https://bugzilla.suse.com/1151229">SUSE bug 1151229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603018" comment="chromedriver-77.0.3865.90-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603019" comment="chromium-77.0.3865.90-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13686</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13686" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13686" ref_url="https://www.suse.com/security/cve/CVE-2019-13686" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13686/">CVE-2019-13686</cve>
	<bugzilla href="https://bugzilla.suse.com/1151229">SUSE bug 1151229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603018" comment="chromedriver-77.0.3865.90-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603019" comment="chromium-77.0.3865.90-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13687</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13687" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13687" ref_url="https://www.suse.com/security/cve/CVE-2019-13687" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13687/">CVE-2019-13687</cve>
	<bugzilla href="https://bugzilla.suse.com/1151229">SUSE bug 1151229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603018" comment="chromedriver-77.0.3865.90-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603019" comment="chromium-77.0.3865.90-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13688</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13688" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13688" ref_url="https://www.suse.com/security/cve/CVE-2019-13688" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13688/">CVE-2019-13688</cve>
	<bugzilla href="https://bugzilla.suse.com/1151229">SUSE bug 1151229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603018" comment="chromedriver-77.0.3865.90-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603019" comment="chromium-77.0.3865.90-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13693</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13693" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13693" ref_url="https://www.suse.com/security/cve/CVE-2019-13693" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in IndexedDB in Google Chrome prior to 77.0.3865.120 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13693/">CVE-2019-13693</cve>
	<bugzilla href="https://bugzilla.suse.com/1153660">SUSE bug 1153660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603298" comment="chromedriver-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603299" comment="chromium-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13694</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13694" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13694" ref_url="https://www.suse.com/security/cve/CVE-2019-13694" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13694/">CVE-2019-13694</cve>
	<bugzilla href="https://bugzilla.suse.com/1153660">SUSE bug 1153660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603298" comment="chromedriver-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603299" comment="chromium-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13695" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13695" ref_url="https://www.suse.com/security/cve/CVE-2019-13695" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome on Android prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13695/">CVE-2019-13695</cve>
	<bugzilla href="https://bugzilla.suse.com/1153660">SUSE bug 1153660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603298" comment="chromedriver-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603299" comment="chromium-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13696" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13696" ref_url="https://www.suse.com/security/cve/CVE-2019-13696" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in JavaScript in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13696/">CVE-2019-13696</cve>
	<bugzilla href="https://bugzilla.suse.com/1153660">SUSE bug 1153660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603298" comment="chromedriver-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603299" comment="chromium-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13697</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13697" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13697" ref_url="https://www.suse.com/security/cve/CVE-2019-13697" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in performance APIs in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13697/">CVE-2019-13697</cve>
	<bugzilla href="https://bugzilla.suse.com/1153660">SUSE bug 1153660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603298" comment="chromedriver-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603299" comment="chromium-77.0.3865.120-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13699</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13699" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13699" ref_url="https://www.suse.com/security/cve/CVE-2019-13699" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13699/">CVE-2019-13699</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13700</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13700" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13700" ref_url="https://www.suse.com/security/cve/CVE-2019-13700" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in the gamepad API in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13700/">CVE-2019-13700</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13701</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13701" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13701" ref_url="https://www.suse.com/security/cve/CVE-2019-13701" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Incorrect implementation in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13701/">CVE-2019-13701</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13702</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13702" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13702" ref_url="https://www.suse.com/security/cve/CVE-2019-13702" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13702/">CVE-2019-13702</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13703</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13703" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13703" ref_url="https://www.suse.com/security/cve/CVE-2019-13703" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in the Omnibox in Google Chrome on Android prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13703/">CVE-2019-13703</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13704" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13704" ref_url="https://www.suse.com/security/cve/CVE-2019-13704" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13704/">CVE-2019-13704</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13705" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13705" ref_url="https://www.suse.com/security/cve/CVE-2019-13705" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 78.0.3904.70 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13705/">CVE-2019-13705</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13706</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13706" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13706" ref_url="https://www.suse.com/security/cve/CVE-2019-13706" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in PDFium in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13706/">CVE-2019-13706</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13707" ref_url="https://www.suse.com/security/cve/CVE-2019-13707" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in intents in Google Chrome on Android prior to 78.0.3904.70 allowed a local attacker to leak files via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13707/">CVE-2019-13707</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13708</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13708" ref_url="https://www.suse.com/security/cve/CVE-2019-13708" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in navigation in Google Chrome on iOS prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13708/">CVE-2019-13708</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13709</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13709" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13709" ref_url="https://www.suse.com/security/cve/CVE-2019-13709" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13709/">CVE-2019-13709</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13710</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13710" ref_url="https://www.suse.com/security/cve/CVE-2019-13710" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13710/">CVE-2019-13710</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13711</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13711" ref_url="https://www.suse.com/security/cve/CVE-2019-13711" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13711/">CVE-2019-13711</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13713</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13713" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13713" ref_url="https://www.suse.com/security/cve/CVE-2019-13713" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13713/">CVE-2019-13713</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13714</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13714" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13714" ref_url="https://www.suse.com/security/cve/CVE-2019-13714" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Color Enhancer extension in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to inject CSS into an HTML page via a crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13714/">CVE-2019-13714</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13715</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13715" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13715" ref_url="https://www.suse.com/security/cve/CVE-2019-13715" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13715/">CVE-2019-13715</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13716</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13716" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13716" ref_url="https://www.suse.com/security/cve/CVE-2019-13716" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in service workers in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13716/">CVE-2019-13716</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13717</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13717" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13717" ref_url="https://www.suse.com/security/cve/CVE-2019-13717" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13717/">CVE-2019-13717</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13718</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13718" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13718" ref_url="https://www.suse.com/security/cve/CVE-2019-13718" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13718/">CVE-2019-13718</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13719</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13719" ref_url="https://www.suse.com/security/cve/CVE-2019-13719" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13719/">CVE-2019-13719</cve>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13720</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13720" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13720" ref_url="https://www.suse.com/security/cve/CVE-2019-13720" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html" source="SUSE-SU"/>
    <description>
    Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13720/">CVE-2019-13720</cve>
	<bugzilla href="https://bugzilla.suse.com/1155643">SUSE bug 1155643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603868" comment="opera-65.0.3467.62-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603397" comment="chromedriver-78.0.3904.87-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603398" comment="chromium-78.0.3904.87-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13721</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13721" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13721" ref_url="https://www.suse.com/security/cve/CVE-2019-13721" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html" source="SUSE-SU"/>
    <description>
    Use after free in PDFium in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13721/">CVE-2019-13721</cve>
	<bugzilla href="https://bugzilla.suse.com/1155643">SUSE bug 1155643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603868" comment="opera-65.0.3467.62-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603397" comment="chromedriver-78.0.3904.87-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603398" comment="chromium-78.0.3904.87-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13722</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13722" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606217" comment="MozillaFirefox-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606218" comment="MozillaFirefox-branding-upstream-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606219" comment="MozillaFirefox-buildsymbols-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606220" comment="MozillaFirefox-devel-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606221" comment="MozillaFirefox-translations-common-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606222" comment="MozillaFirefox-translations-other-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607008" comment="MozillaThunderbird-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607009" comment="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607010" comment="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13723</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13723" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13723" ref_url="https://www.suse.com/security/cve/CVE-2019-13723" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2544-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00035.html" source="SUSE-SU"/>
    <description>
    Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13723/">CVE-2019-13723</cve>
	<bugzilla href="https://bugzilla.suse.com/1157269">SUSE bug 1157269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603743" comment="chromedriver-78.0.3904.108-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603744" comment="chromium-78.0.3904.108-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13724</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13724" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13724" ref_url="https://www.suse.com/security/cve/CVE-2019-13724" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2544-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00035.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13724/">CVE-2019-13724</cve>
	<bugzilla href="https://bugzilla.suse.com/1157269">SUSE bug 1157269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603743" comment="chromedriver-78.0.3904.108-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603744" comment="chromium-78.0.3904.108-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13725</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13725" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13725" ref_url="https://www.suse.com/security/cve/CVE-2019-13725" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Use-after-free in Bluetooth in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13725/">CVE-2019-13725</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13726</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13726" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13726" ref_url="https://www.suse.com/security/cve/CVE-2019-13726" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in password manager in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13726/">CVE-2019-13726</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13727</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13727" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13727" ref_url="https://www.suse.com/security/cve/CVE-2019-13727" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13727/">CVE-2019-13727</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13728</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13728" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13728" ref_url="https://www.suse.com/security/cve/CVE-2019-13728" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13728/">CVE-2019-13728</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13729</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13729" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13729" ref_url="https://www.suse.com/security/cve/CVE-2019-13729" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Use-after-free in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13729/">CVE-2019-13729</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13730</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13730" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13730" ref_url="https://www.suse.com/security/cve/CVE-2019-13730" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13730/">CVE-2019-13730</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13732</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13732" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13732" ref_url="https://www.suse.com/security/cve/CVE-2019-13732" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Use-after-free in WebAudio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13732/">CVE-2019-13732</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13734</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13734" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13734" ref_url="https://www.suse.com/security/cve/CVE-2019-13734" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13734/">CVE-2019-13734</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13735</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13735" ref_url="https://www.suse.com/security/cve/CVE-2019-13735" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13735/">CVE-2019-13735</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13736</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13736" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13736" ref_url="https://www.suse.com/security/cve/CVE-2019-13736" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Integer overflow in PDFium in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13736/">CVE-2019-13736</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13737</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13737" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13737" ref_url="https://www.suse.com/security/cve/CVE-2019-13737" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in autocomplete in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13737/">CVE-2019-13737</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13738</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13738" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13738" ref_url="https://www.suse.com/security/cve/CVE-2019-13738" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigation in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13738/">CVE-2019-13738</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13739</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13739" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13739" ref_url="https://www.suse.com/security/cve/CVE-2019-13739" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13739/">CVE-2019-13739</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13740</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13740" ref_url="https://www.suse.com/security/cve/CVE-2019-13740" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in sharing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13740/">CVE-2019-13740</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13741</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13741" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13741" ref_url="https://www.suse.com/security/cve/CVE-2019-13741" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Blink in Google Chrome prior to 79.0.3945.79 allowed a local attacker to bypass same origin policy via crafted clipboard content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13741/">CVE-2019-13741</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13742</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13742" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13742" ref_url="https://www.suse.com/security/cve/CVE-2019-13742" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13742/">CVE-2019-13742</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13743</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13743" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13743" ref_url="https://www.suse.com/security/cve/CVE-2019-13743" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in external protocol handling in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13743/">CVE-2019-13743</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13744</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13744" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13744" ref_url="https://www.suse.com/security/cve/CVE-2019-13744" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in cookies in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13744/">CVE-2019-13744</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13745</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13745" ref_url="https://www.suse.com/security/cve/CVE-2019-13745" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in audio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13745/">CVE-2019-13745</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13746</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13746" ref_url="https://www.suse.com/security/cve/CVE-2019-13746" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13746/">CVE-2019-13746</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13747</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13747" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13747" ref_url="https://www.suse.com/security/cve/CVE-2019-13747" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Uninitialized data in rendering in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13747/">CVE-2019-13747</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13748</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13748" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13748" ref_url="https://www.suse.com/security/cve/CVE-2019-13748" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 79.0.3945.79 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13748/">CVE-2019-13748</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13749" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13749" ref_url="https://www.suse.com/security/cve/CVE-2019-13749" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13749/">CVE-2019-13749</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13750</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13750" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13750" ref_url="https://www.suse.com/security/cve/CVE-2019-13750" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass defense-in-depth measures via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13750/">CVE-2019-13750</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13751" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13751" ref_url="https://www.suse.com/security/cve/CVE-2019-13751" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13751/">CVE-2019-13751</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13752" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13752" ref_url="https://www.suse.com/security/cve/CVE-2019-13752" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13752/">CVE-2019-13752</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13753</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13753" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13753" ref_url="https://www.suse.com/security/cve/CVE-2019-13753" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13753/">CVE-2019-13753</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13754</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13754" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13754" ref_url="https://www.suse.com/security/cve/CVE-2019-13754" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13754/">CVE-2019-13754</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13755</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13755" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13755" ref_url="https://www.suse.com/security/cve/CVE-2019-13755" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to disable extensions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13755/">CVE-2019-13755</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13756</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13756" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13756" ref_url="https://www.suse.com/security/cve/CVE-2019-13756" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in printing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13756/">CVE-2019-13756</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13757</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13757" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13757" ref_url="https://www.suse.com/security/cve/CVE-2019-13757" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13757/">CVE-2019-13757</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13758</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13758" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13758" ref_url="https://www.suse.com/security/cve/CVE-2019-13758" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigation in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13758/">CVE-2019-13758</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13759</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13759" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13759" ref_url="https://www.suse.com/security/cve/CVE-2019-13759" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in interstitials in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13759/">CVE-2019-13759</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13761</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13761" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13761" ref_url="https://www.suse.com/security/cve/CVE-2019-13761" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13761/">CVE-2019-13761</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13762</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13762" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13762" ref_url="https://www.suse.com/security/cve/CVE-2019-13762" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 79.0.3945.79 allowed a local attacker to spoof downloaded files via local code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13762/">CVE-2019-13762</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13763</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13763" ref_url="https://www.suse.com/security/cve/CVE-2019-13763" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in payments in Google Chrome prior to 79.0.3945.79 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13763/">CVE-2019-13763</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13764</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13764" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13764" ref_url="https://www.suse.com/security/cve/CVE-2019-13764" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html" source="SUSE-SU"/>
    <description>
    Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13764/">CVE-2019-13764</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609758" comment="chromedriver-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609759" comment="chromium-79.0.3945.79-lp151.2.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13767" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13767" ref_url="https://www.suse.com/security/cve/CVE-2019-13767" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2712-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00005.html" source="SUSE-SU"/>
    <description>
    Use after free in media picker in Google Chrome prior to 79.0.3945.88 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13767/">CVE-2019-13767</cve>
	<bugzilla href="https://bugzilla.suse.com/1159498">SUSE bug 1159498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609760" comment="chromedriver-79.0.3945.88-lp151.2.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609761" comment="chromium-79.0.3945.88-lp151.2.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1387</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604916" comment="perl-Authen-SASL-2.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277151" comment="perl-Authen-SASL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604917" comment="perl-Net-SMTP-SSL-1.04-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277152" comment="perl-Net-SMTP-SSL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13917</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13917" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13917" ref_url="https://www.suse.com/security/cve/CVE-2019-13917" source="SUSE CVE"/>
		<reference ref_id="TID000019528" ref_url="https://www.suse.com/support/kb/doc/?id=000019528" source="SUSE-SU"/>
		<reference ref_id="TID7024110" ref_url="https://www.suse.com/support/kb/doc/?id=7024110" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
    <description>
    Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13917/">CVE-2019-13917</cve>
	<bugzilla href="https://bugzilla.suse.com/1142207">SUSE bug 1142207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602001" comment="exim-4.88-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602002" comment="eximon-4.88-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602003" comment="eximstats-html-4.88-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13962</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13962" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13962" ref_url="https://www.suse.com/security/cve/CVE-2019-13962" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    lavc_CopyPicture in modules/codec/avcodec/video.c in VideoLAN VLC media player through 3.0.7 has a heap-based buffer over-read because it does not properly validate the width and height.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-13962/">CVE-2019-13962</cve>
	<bugzilla href="https://bugzilla.suse.com/1142161">SUSE bug 1142161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14192</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14192" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14192" ref_url="https://www.suse.com/security/cve/CVE-2019-14192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14192/">CVE-2019-14192</cve>
	<bugzilla href="https://bugzilla.suse.com/1143777">SUSE bug 1143777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14193</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14193" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14193" ref_url="https://www.suse.com/security/cve/CVE-2019-14193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14193/">CVE-2019-14193</cve>
	<bugzilla href="https://bugzilla.suse.com/1143817">SUSE bug 1143817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14194</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14194" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14194" ref_url="https://www.suse.com/security/cve/CVE-2019-14194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14194/">CVE-2019-14194</cve>
	<bugzilla href="https://bugzilla.suse.com/1143818">SUSE bug 1143818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14195</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14195" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14195" ref_url="https://www.suse.com/security/cve/CVE-2019-14195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14195/">CVE-2019-14195</cve>
	<bugzilla href="https://bugzilla.suse.com/1143819">SUSE bug 1143819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14196</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14196" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14196" ref_url="https://www.suse.com/security/cve/CVE-2019-14196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14196/">CVE-2019-14196</cve>
	<bugzilla href="https://bugzilla.suse.com/1143820">SUSE bug 1143820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14197</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14197" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14197" ref_url="https://www.suse.com/security/cve/CVE-2019-14197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is a read of out-of-bounds data at nfs_read_reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14197/">CVE-2019-14197</cve>
	<bugzilla href="https://bugzilla.suse.com/1143821">SUSE bug 1143821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14198</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14198" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14198" ref_url="https://www.suse.com/security/cve/CVE-2019-14198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14198/">CVE-2019-14198</cve>
	<bugzilla href="https://bugzilla.suse.com/1143823">SUSE bug 1143823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14199</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14199" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14199" ref_url="https://www.suse.com/security/cve/CVE-2019-14199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14199/">CVE-2019-14199</cve>
	<bugzilla href="https://bugzilla.suse.com/1143824">SUSE bug 1143824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14200</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14200" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14200" ref_url="https://www.suse.com/security/cve/CVE-2019-14200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14200/">CVE-2019-14200</cve>
	<bugzilla href="https://bugzilla.suse.com/1143825">SUSE bug 1143825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14201</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14201" ref_url="https://www.suse.com/security/cve/CVE-2019-14201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14201/">CVE-2019-14201</cve>
	<bugzilla href="https://bugzilla.suse.com/1143827">SUSE bug 1143827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14202</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14202" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14202" ref_url="https://www.suse.com/security/cve/CVE-2019-14202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14202/">CVE-2019-14202</cve>
	<bugzilla href="https://bugzilla.suse.com/1143828">SUSE bug 1143828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14203</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14203" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14203" ref_url="https://www.suse.com/security/cve/CVE-2019-14203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14203/">CVE-2019-14203</cve>
	<bugzilla href="https://bugzilla.suse.com/1143830">SUSE bug 1143830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14204</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14204" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14204" ref_url="https://www.suse.com/security/cve/CVE-2019-14204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14204/">CVE-2019-14204</cve>
	<bugzilla href="https://bugzilla.suse.com/1143831">SUSE bug 1143831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14232</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14232" ref_url="https://www.suse.com/security/cve/CVE-2019-14232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14232/">CVE-2019-14232</cve>
	<bugzilla href="https://bugzilla.suse.com/1142880">SUSE bug 1142880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602031" comment="python3-Django-2.2.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173965" comment="python3-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14233</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14233" ref_url="https://www.suse.com/security/cve/CVE-2019-14233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14233/">CVE-2019-14233</cve>
	<bugzilla href="https://bugzilla.suse.com/1142882">SUSE bug 1142882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602031" comment="python3-Django-2.2.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173965" comment="python3-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14234</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14234" ref_url="https://www.suse.com/security/cve/CVE-2019-14234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14234/">CVE-2019-14234</cve>
	<bugzilla href="https://bugzilla.suse.com/1142883">SUSE bug 1142883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602031" comment="python3-Django-2.2.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173965" comment="python3-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14235</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14235" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14235" ref_url="https://www.suse.com/security/cve/CVE-2019-14235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14235/">CVE-2019-14235</cve>
	<bugzilla href="https://bugzilla.suse.com/1142885">SUSE bug 1142885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602031" comment="python3-Django-2.2.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173965" comment="python3-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14241</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14241" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14241" ref_url="https://www.suse.com/security/cve/CVE-2019-14241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00062.html" source="SUSE-SU"/>
    <description>
    HAProxy through 2.0.2 allows attackers to cause a denial of service (ha_panic) via vectors related to htx_manage_client_side_cookies in proto_htx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-14241/">CVE-2019-14241</cve>
	<bugzilla href="https://bugzilla.suse.com/1142529">SUSE bug 1142529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603761" comment="haproxy-2.0.5+git0.d905f49a-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14250</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605845" comment="binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605846" comment="binutils-devel-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605847" comment="binutils-devel-32bit-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605848" comment="binutils-gold-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603327" comment="cpp7-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268648" comment="cpp7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608126" comment="cpp9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283950" comment="cpp9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605849" comment="cross-aarch64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605850" comment="cross-arm-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605851" comment="cross-avr-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605852" comment="cross-epiphany-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605853" comment="cross-hppa-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605854" comment="cross-hppa64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605855" comment="cross-i386-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605856" comment="cross-ia64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605857" comment="cross-m68k-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605858" comment="cross-mips-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608127" comment="cross-nvptx-gcc9-9.3.1+git1296-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283951" comment="cross-nvptx-gcc9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608128" comment="cross-nvptx-newlib9-devel-9.3.1+git1296-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283952" comment="cross-nvptx-newlib9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605859" comment="cross-ppc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605860" comment="cross-ppc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605861" comment="cross-ppc64le-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605862" comment="cross-riscv64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605863" comment="cross-rx-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605864" comment="cross-s390-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605865" comment="cross-s390x-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605866" comment="cross-sparc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605867" comment="cross-sparc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605868" comment="cross-spu-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603328" comment="gcc7-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268649" comment="gcc7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603329" comment="gcc7-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268650" comment="gcc7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603330" comment="gcc7-ada-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268651" comment="gcc7-ada is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603331" comment="gcc7-ada-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268652" comment="gcc7-ada-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603332" comment="gcc7-c++-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268653" comment="gcc7-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603333" comment="gcc7-c++-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268654" comment="gcc7-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603334" comment="gcc7-fortran-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268655" comment="gcc7-fortran is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603335" comment="gcc7-fortran-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268656" comment="gcc7-fortran-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603336" comment="gcc7-go-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268657" comment="gcc7-go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603337" comment="gcc7-go-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268658" comment="gcc7-go-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603338" comment="gcc7-info-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268659" comment="gcc7-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603339" comment="gcc7-locale-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268660" comment="gcc7-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603340" comment="gcc7-obj-c++-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268661" comment="gcc7-obj-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603341" comment="gcc7-obj-c++-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268662" comment="gcc7-obj-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603342" comment="gcc7-objc-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268663" comment="gcc7-objc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603343" comment="gcc7-objc-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268664" comment="gcc7-objc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608129" comment="gcc9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283953" comment="gcc9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608130" comment="gcc9-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283954" comment="gcc9-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608131" comment="gcc9-ada-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283955" comment="gcc9-ada is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608132" comment="gcc9-ada-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283956" comment="gcc9-ada-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608133" comment="gcc9-c++-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283957" comment="gcc9-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608134" comment="gcc9-c++-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283958" comment="gcc9-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608135" comment="gcc9-fortran-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283959" comment="gcc9-fortran is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608136" comment="gcc9-fortran-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283960" comment="gcc9-fortran-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608137" comment="gcc9-go-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283961" comment="gcc9-go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608138" comment="gcc9-go-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283962" comment="gcc9-go-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608139" comment="gcc9-info-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283963" comment="gcc9-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608140" comment="gcc9-locale-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283964" comment="gcc9-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603344" comment="libada7-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268665" comment="libada7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603345" comment="libada7-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268666" comment="libada7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608141" comment="libada9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283965" comment="libada9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608142" comment="libada9-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283966" comment="libada9-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603346" comment="libasan4-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268667" comment="libasan4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603347" comment="libasan4-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268668" comment="libasan4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608143" comment="libasan5-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283967" comment="libasan5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608144" comment="libasan5-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283968" comment="libasan5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608145" comment="libatomic1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152915" comment="libatomic1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608146" comment="libatomic1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152916" comment="libatomic1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603348" comment="libcilkrts5-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152919" comment="libcilkrts5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603349" comment="libcilkrts5-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152920" comment="libcilkrts5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605869" comment="libctf-nobfd0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605870" comment="libctf0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608147" comment="libgcc_s1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152931" comment="libgcc_s1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608148" comment="libgcc_s1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152932" comment="libgcc_s1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603350" comment="libgfortran4-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268669" comment="libgfortran4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603351" comment="libgfortran4-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268670" comment="libgfortran4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608149" comment="libgfortran5-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283969" comment="libgfortran5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608150" comment="libgfortran5-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283970" comment="libgfortran5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603352" comment="libgo11-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268671" comment="libgo11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603353" comment="libgo11-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268672" comment="libgo11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608151" comment="libgo14-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283971" comment="libgo14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608152" comment="libgo14-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283972" comment="libgo14-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608153" comment="libgomp1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152942" comment="libgomp1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608154" comment="libgomp1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152943" comment="libgomp1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608155" comment="libitm1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152946" comment="libitm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608156" comment="libitm1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152947" comment="libitm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608157" comment="liblsan0-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152950" comment="liblsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603354" comment="libobjc4-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152198" comment="libobjc4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603355" comment="libobjc4-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152955" comment="libobjc4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608158" comment="libquadmath0-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152956" comment="libquadmath0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608159" comment="libquadmath0-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152957" comment="libquadmath0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608160" comment="libstdc++6-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152962" comment="libstdc++6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608161" comment="libstdc++6-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152963" comment="libstdc++6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603356" comment="libstdc++6-devel-gcc7-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268673" comment="libstdc++6-devel-gcc7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603357" comment="libstdc++6-devel-gcc7-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268674" comment="libstdc++6-devel-gcc7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608162" comment="libstdc++6-devel-gcc9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283973" comment="libstdc++6-devel-gcc9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608163" comment="libstdc++6-devel-gcc9-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283974" comment="libstdc++6-devel-gcc9-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608164" comment="libstdc++6-locale-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152968" comment="libstdc++6-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608165" comment="libstdc++6-pp-gcc9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283975" comment="libstdc++6-pp-gcc9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608166" comment="libstdc++6-pp-gcc9-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283976" comment="libstdc++6-pp-gcc9-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608167" comment="libtsan0-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152969" comment="libtsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603358" comment="libubsan0-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152971" comment="libubsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603359" comment="libubsan0-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152972" comment="libubsan0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608168" comment="libubsan1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283977" comment="libubsan1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608169" comment="libubsan1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283978" comment="libubsan1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14271</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14271" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14271" ref_url="https://www.suse.com/security/cve/CVE-2019-14271" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html" source="SUSE-SU"/>
    <description>
    In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14271/">CVE-2019-14271</cve>
	<bugzilla href="https://bugzilla.suse.com/1143409">SUSE bug 1143409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602528" comment="containerd-1.2.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602529" comment="containerd-ctr-1.2.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602530" comment="docker-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602531" comment="docker-bash-completion-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602532" comment="docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602533" comment="docker-runc-1.0.0rc8+gitr3826_425e105d5a03-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602534" comment="docker-test-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602535" comment="docker-zsh-completion-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602536" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14274</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14274" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14274" ref_url="https://www.suse.com/security/cve/CVE-2019-14274" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00038.html" source="SUSE-SU"/>
    <description>
    MCPP 2.7.2 has a heap-based buffer overflow in the do_msg() function in support.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14274/">CVE-2019-14274</cve>
	<bugzilla href="https://bugzilla.suse.com/1143032">SUSE bug 1143032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607270" comment="libmcpp0-2.7.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280715" comment="libmcpp0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607271" comment="mcpp-2.7.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280716" comment="mcpp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607272" comment="mcpp-devel-2.7.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280717" comment="mcpp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14275" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606002" comment="transfig-3.2.6a-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172240" comment="transfig is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14283</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602144" comment="kernel-debug-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602145" comment="kernel-debug-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602146" comment="kernel-debug-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602147" comment="kernel-default-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602148" comment="kernel-default-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602149" comment="kernel-default-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602150" comment="kernel-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602151" comment="kernel-docs-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602152" comment="kernel-docs-html-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602153" comment="kernel-kvmsmall-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602154" comment="kernel-kvmsmall-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602155" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602156" comment="kernel-macros-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602157" comment="kernel-obs-build-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602158" comment="kernel-obs-qa-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602159" comment="kernel-source-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602160" comment="kernel-source-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602161" comment="kernel-syms-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602162" comment="kernel-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602163" comment="kernel-vanilla-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602164" comment="kernel-vanilla-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602144" comment="kernel-debug-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602145" comment="kernel-debug-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602146" comment="kernel-debug-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602147" comment="kernel-default-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602148" comment="kernel-default-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602149" comment="kernel-default-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602150" comment="kernel-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602151" comment="kernel-docs-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602152" comment="kernel-docs-html-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602153" comment="kernel-kvmsmall-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602154" comment="kernel-kvmsmall-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602155" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602156" comment="kernel-macros-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602157" comment="kernel-obs-build-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602158" comment="kernel-obs-qa-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602159" comment="kernel-source-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602160" comment="kernel-source-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602161" comment="kernel-syms-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602162" comment="kernel-vanilla-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602163" comment="kernel-vanilla-base-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602164" comment="kernel-vanilla-devel-4.12.14-lp151.28.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14287</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2656-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192656-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00047.html" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156093">SUSE bug 1156093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603300" comment="sudo-1.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603301" comment="sudo-devel-1.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603302" comment="sudo-test-1.8.22-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14296</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14296" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14296" ref_url="https://www.suse.com/security/cve/CVE-2019-14296" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0163-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html" source="SUSE-SU"/>
    <description>
    canUnpack in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (SEGV or buffer overflow, and application crash) or possibly have unspecified other impact via a crafted UPX packed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-14296/">CVE-2019-14296</cve>
	<bugzilla href="https://bugzilla.suse.com/1143839">SUSE bug 1143839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605500" comment="upx-3.96-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165780" comment="upx is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14318</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14318" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14318" ref_url="https://www.suse.com/security/cve/CVE-2019-14318" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1968-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00066.html" source="SUSE-SU"/>
    <description>
    Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14318/">CVE-2019-14318</cve>
	<bugzilla href="https://bugzilla.suse.com/1143532">SUSE bug 1143532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145187">SUSE bug 1145187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609762" comment="libcryptopp-devel-5.6.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262572" comment="libcryptopp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609763" comment="libcryptopp5_6_5-5.6.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262574" comment="libcryptopp5_6_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009509954" comment="libcryptopp5_6_5-32bit-5.6.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262576" comment="libcryptopp5_6_5-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14378</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
    <description>
    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603672" comment="qemu-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603673" comment="qemu-arm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603674" comment="qemu-audio-alsa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603675" comment="qemu-audio-oss-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603676" comment="qemu-audio-pa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603677" comment="qemu-audio-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603678" comment="qemu-block-curl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603679" comment="qemu-block-dmg-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603680" comment="qemu-block-gluster-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603681" comment="qemu-block-iscsi-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603682" comment="qemu-block-nfs-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603683" comment="qemu-block-rbd-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603684" comment="qemu-block-ssh-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603685" comment="qemu-extra-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603686" comment="qemu-guest-agent-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603687" comment="qemu-ipxe-1.0.0+-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603688" comment="qemu-ksm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603689" comment="qemu-kvm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603690" comment="qemu-lang-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603691" comment="qemu-linux-user-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603692" comment="qemu-ppc-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603693" comment="qemu-s390-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603694" comment="qemu-seabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603695" comment="qemu-sgabios-8-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602567" comment="qemu-testsuite-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603696" comment="qemu-tools-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603697" comment="qemu-ui-curses-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603698" comment="qemu-ui-gtk-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603699" comment="qemu-ui-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603700" comment="qemu-vgabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603701" comment="qemu-x86-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14382</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14382" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14382" ref_url="https://www.suse.com/security/cve/CVE-2019-14382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005954.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html" source="SUSE-SU"/>
    <description>
    DSM in libopenmpt before 0.4.2 allows an assertion failure during file parsing with debug STLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14382/">CVE-2019-14382</cve>
	<bugzilla href="https://bugzilla.suse.com/1143582">SUSE bug 1143582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603073" comment="libmodplug-devel-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230500" comment="libmodplug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603074" comment="libmodplug1-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151586" comment="libmodplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603075" comment="libmodplug1-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230501" comment="libmodplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603076" comment="libopenmpt-devel-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230503" comment="libopenmpt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603077" comment="libopenmpt0-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230504" comment="libopenmpt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603078" comment="libopenmpt0-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230505" comment="libopenmpt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603079" comment="libopenmpt_modplug1-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230506" comment="libopenmpt_modplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603080" comment="libopenmpt_modplug1-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230507" comment="libopenmpt_modplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603081" comment="openmpt123-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230508" comment="openmpt123 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14383</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14383" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14383" ref_url="https://www.suse.com/security/cve/CVE-2019-14383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005954.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html" source="SUSE-SU"/>
    <description>
    J2B in libopenmpt before 0.4.2 allows an assertion failure during file parsing with debug STLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14383/">CVE-2019-14383</cve>
	<bugzilla href="https://bugzilla.suse.com/1143584">SUSE bug 1143584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603073" comment="libmodplug-devel-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230500" comment="libmodplug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603074" comment="libmodplug1-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151586" comment="libmodplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603075" comment="libmodplug1-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230501" comment="libmodplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603076" comment="libopenmpt-devel-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230503" comment="libopenmpt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603077" comment="libopenmpt0-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230504" comment="libopenmpt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603078" comment="libopenmpt0-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230505" comment="libopenmpt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603079" comment="libopenmpt_modplug1-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230506" comment="libopenmpt_modplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603080" comment="libopenmpt_modplug1-32bit-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230507" comment="libopenmpt_modplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603081" comment="openmpt123-0.3.17-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230508" comment="openmpt123 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14437</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14437" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14437" ref_url="https://www.suse.com/security/cve/CVE-2019-14437" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    The xiph_SplitHeaders function in modules/demux/xiph.h in VideoLAN VLC media player 3.0.7.1 does not check array bounds properly. As a result, a heap-based buffer over-read can be triggered via a crafted .ogg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14437/">CVE-2019-14437</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14438</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14438" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14438" ref_url="https://www.suse.com/security/cve/CVE-2019-14438" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read in xiph_PackHeaders() in modules/demux/xiph.h in VideoLAN VLC media player 3.0.7.1 allows remote attackers to trigger a heap-based buffer over-read via a crafted .ogg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14438/">CVE-2019-14438</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14444</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444</cve>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605845" comment="binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605846" comment="binutils-devel-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605847" comment="binutils-devel-32bit-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605848" comment="binutils-gold-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605849" comment="cross-aarch64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605850" comment="cross-arm-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605851" comment="cross-avr-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605852" comment="cross-epiphany-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605853" comment="cross-hppa-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605854" comment="cross-hppa64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605855" comment="cross-i386-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605856" comment="cross-ia64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605857" comment="cross-m68k-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605858" comment="cross-mips-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605859" comment="cross-ppc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605860" comment="cross-ppc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605861" comment="cross-ppc64le-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605862" comment="cross-riscv64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605863" comment="cross-rx-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605864" comment="cross-s390-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605865" comment="cross-s390x-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605866" comment="cross-sparc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605867" comment="cross-sparc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605868" comment="cross-spu-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605869" comment="libctf-nobfd0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605870" comment="libctf0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14491</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14491" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14491" ref_url="https://www.suse.com/security/cve/CVE-2019-14491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3192-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1. There is an out of bounds read in the function cv::predictOrdered&lt;cv::HaarEvaluator&gt; in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14491/">CVE-2019-14491</cve>
	<bugzilla href="https://bugzilla.suse.com/1144348">SUSE bug 1144348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144352">SUSE bug 1144352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603884" comment="libopencv3_3-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223580" comment="libopencv3_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603885" comment="opencv-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175725" comment="opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603886" comment="opencv-devel-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175727" comment="opencv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603887" comment="opencv-doc-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175729" comment="opencv-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603888" comment="python2-opencv-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223581" comment="python2-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603889" comment="python3-opencv-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175741" comment="python3-opencv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14492</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14492" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14492" ref_url="https://www.suse.com/security/cve/CVE-2019-14492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3192-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1. There is an out of bounds read/write in the function HaarEvaluator::OptFeature::calc in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14492/">CVE-2019-14492</cve>
	<bugzilla href="https://bugzilla.suse.com/1144348">SUSE bug 1144348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144352">SUSE bug 1144352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603884" comment="libopencv3_3-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223580" comment="libopencv3_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603885" comment="opencv-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175725" comment="opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603886" comment="opencv-devel-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175727" comment="opencv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603887" comment="opencv-doc-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175729" comment="opencv-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603888" comment="python2-opencv-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223581" comment="python2-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603889" comment="python3-opencv-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175741" comment="python3-opencv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14498" ref_url="https://www.suse.com/security/cve/CVE-2019-14498" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    A divide-by-zero error exists in the Control function of demux/caf.c in VideoLAN VLC media player 3.0.7.1. As a result, an FPE can be triggered via a crafted CAF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14498/">CVE-2019-14498</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14523</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14523" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14523" ref_url="https://www.suse.com/security/cve/CVE-2019-14523" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00083.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Schism Tracker through 20190722. There is an integer underflow via a large plen in fmt_okt_load_song in the Amiga Oktalyzer parser in fmt/okt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14523/">CVE-2019-14523</cve>
	<bugzilla href="https://bugzilla.suse.com/1144266">SUSE bug 1144266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602522" comment="schismtracker-20190805-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262655" comment="schismtracker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14524</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14524" ref_url="https://www.suse.com/security/cve/CVE-2019-14524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00083.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Schism Tracker through 20190722. There is a heap-based buffer overflow via a large number of song patterns in fmt_mtm_load_song in fmt/mtm.c, a different vulnerability than CVE-2019-14465.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14524/">CVE-2019-14524</cve>
	<bugzilla href="https://bugzilla.suse.com/1144261">SUSE bug 1144261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602522" comment="schismtracker-20190805-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262655" comment="schismtracker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14533</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14533" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14533" ref_url="https://www.suse.com/security/cve/CVE-2019-14533" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    The Control function of demux/asf/asf.c in VideoLAN VLC media player 3.0.7.1 has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14533/">CVE-2019-14533</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14534</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14534" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14534" ref_url="https://www.suse.com/security/cve/CVE-2019-14534" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    In VideoLAN VLC media player 3.0.7.1, there is a NULL pointer dereference at the function SeekPercent of demux/asf/asf.c that will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14534/">CVE-2019-14534</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14535</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14535" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14535" ref_url="https://www.suse.com/security/cve/CVE-2019-14535" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    A divide-by-zero error exists in the SeekIndex function of demux/asf/asf.c in VideoLAN VLC media player 3.0.7.1. As a result, an FPE can be triggered via a crafted WMV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14535/">CVE-2019-14535</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14553</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14553" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14553" ref_url="https://www.suse.com/security/cve/CVE-2019-14553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006617.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Improper authentication in EDK II may allow a privileged user to potentially enable information disclosure via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14553/">CVE-2019-14553</cve>
	<bugzilla href="https://bugzilla.suse.com/1153072">SUSE bug 1153072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607017" comment="ovmf-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607018" comment="ovmf-tools-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607019" comment="qemu-ovmf-ia32-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607020" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607021" comment="qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14559</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00020.html" source="SUSE-SU"/>
    <description>
    Uncontrolled resource consumption in EDK II may allow an unauthenticated user to potentially enable denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607853" comment="ovmf-2017+git1510945757.b2662641d5-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607854" comment="ovmf-tools-2017+git1510945757.b2662641d5-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607855" comment="qemu-ovmf-ia32-2017+git1510945757.b2662641d5-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607856" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607857" comment="qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14562" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00091.html" source="SUSE-SU"/>
    <description>
    Integer overflow in DxeImageVerificationHandler() EDK II may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562</cve>
	<bugzilla href="https://bugzilla.suse.com/1175476">SUSE bug 1175476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605416" comment="ovmf-2017+git1510945757.b2662641d5-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605417" comment="ovmf-tools-2017+git1510945757.b2662641d5-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605418" comment="qemu-ovmf-ia32-2017+git1510945757.b2662641d5-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605419" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605420" comment="qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14563</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006617.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563</cve>
	<bugzilla href="https://bugzilla.suse.com/1163959">SUSE bug 1163959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607017" comment="ovmf-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607018" comment="ovmf-tools-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607019" comment="qemu-ovmf-ia32-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607020" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607021" comment="qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14575</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14575" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006617.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Logic issue in DxeImageVerificationHandler() for EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575</cve>
	<bugzilla href="https://bugzilla.suse.com/1163969">SUSE bug 1163969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607017" comment="ovmf-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607018" comment="ovmf-tools-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607019" comment="qemu-ovmf-ia32-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607020" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607021" comment="qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14584</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14584" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2314-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7TLVCW5VHXA7SSOSARLTBRZWC5MH642/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7Y57O2IBBHBOVJBEVV6JAOZWLGF53QFS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2IF5TPLLS7U2RNC42HXIHTRUMS4Q6YV/" source="SUSE-SU"/>
    <description>
    Null pointer dereference in Tianocore EDK2 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584</cve>
	<bugzilla href="https://bugzilla.suse.com/1177789">SUSE bug 1177789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606900" comment="ovmf-2017+git1510945757.b2662641d5-lp151.11.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231457" comment="ovmf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606901" comment="ovmf-tools-2017+git1510945757.b2662641d5-lp151.11.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231458" comment="ovmf-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606902" comment="qemu-ovmf-ia32-2017+git1510945757.b2662641d5-lp151.11.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231459" comment="qemu-ovmf-ia32 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606903" comment="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-lp151.11.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606904" comment="qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-lp151.11.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231461" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14615</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14744</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14744" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14744" ref_url="https://www.suse.com/security/cve/CVE-2019-14744" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1851-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1855-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00034.html" source="SUSE-SU"/>
    <description>
    In KDE Frameworks KConfig before 5.61.0, malicious desktop files and configuration files lead to code execution with minimal user interaction. This relates to libKF5ConfigCore.so, and the mishandling of .desktop and .directory files, as demonstrated by a shell command on an Icon line in a .desktop file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14744/">CVE-2019-14744</cve>
	<bugzilla href="https://bugzilla.suse.com/1144600">SUSE bug 1144600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609764" comment="kconf_update5-5.55.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261533" comment="kconf_update5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609765" comment="kconfig-devel-5.55.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261537" comment="kconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009509776" comment="kconfig-devel-32bit-5.55.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261539" comment="kconfig-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609766" comment="kdelibs4-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152123" comment="kdelibs4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609767" comment="kdelibs4-apidocs-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154035" comment="kdelibs4-apidocs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609768" comment="kdelibs4-branding-upstream-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154036" comment="kdelibs4-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609769" comment="kdelibs4-core-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152124" comment="kdelibs4-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609770" comment="kdelibs4-doc-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152125" comment="kdelibs4-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609771" comment="libKF5ConfigCore5-5.55.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261546" comment="libKF5ConfigCore5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009509784" comment="libKF5ConfigCore5-32bit-5.55.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261548" comment="libKF5ConfigCore5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609772" comment="libKF5ConfigCore5-lang-5.55.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261550" comment="libKF5ConfigCore5-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609773" comment="libKF5ConfigGui5-5.55.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261552" comment="libKF5ConfigGui5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009509788" comment="libKF5ConfigGui5-32bit-5.55.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261554" comment="libKF5ConfigGui5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609774" comment="libkde4-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152126" comment="libkde4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009509791" comment="libkde4-32bit-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154044" comment="libkde4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609775" comment="libkde4-devel-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152127" comment="libkde4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609776" comment="libkdecore4-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152128" comment="libkdecore4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009509795" comment="libkdecore4-32bit-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154045" comment="libkdecore4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609777" comment="libkdecore4-devel-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152129" comment="libkdecore4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609778" comment="libksuseinstall-devel-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154046" comment="libksuseinstall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609779" comment="libksuseinstall1-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152130" comment="libksuseinstall1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009509800" comment="libksuseinstall1-32bit-4.14.38-lp151.9.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154047" comment="libksuseinstall1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14751" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14751" ref_url="https://www.suse.com/security/cve/CVE-2019-14751" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00001.html" source="SUSE-SU"/>
    <description>
    NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14751/">CVE-2019-14751</cve>
	<bugzilla href="https://bugzilla.suse.com/1146427">SUSE bug 1146427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607330" comment="python2-nltk-3.4.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280958" comment="python2-nltk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607331" comment="python3-nltk-3.4.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280959" comment="python3-nltk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14776</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14776" ref_url="https://www.suse.com/security/cve/CVE-2019-14776" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read exists in DemuxInit() in demux/asf/asf.c in VideoLAN VLC media player 3.0.7.1 via a crafted .mkv file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14776/">CVE-2019-14776</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14777</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14777" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14777" ref_url="https://www.suse.com/security/cve/CVE-2019-14777" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    The Control function of demux/mkv/mkv.cpp in VideoLAN VLC media player 3.0.7.1 has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14777/">CVE-2019-14777</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14778</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14778" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14778" ref_url="https://www.suse.com/security/cve/CVE-2019-14778" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    The mkv::virtual_segment_c::seek method of demux/mkv/virtual_segment.cpp in VideoLAN VLC media player 3.0.7.1 has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14778/">CVE-2019-14778</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14806</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14806" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14806" ref_url="https://www.suse.com/security/cve/CVE-2019-14806" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2365-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005934.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00047.html" source="SUSE-SU"/>
    <description>
    Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14806/">CVE-2019-14806</cve>
	<bugzilla href="https://bugzilla.suse.com/1145383">SUSE bug 1145383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602812" comment="python-Werkzeug-doc-0.14.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263953" comment="python-Werkzeug-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602813" comment="python2-Werkzeug-0.14.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263954" comment="python2-Werkzeug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602814" comment="python3-Werkzeug-0.14.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263955" comment="python3-Werkzeug is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14809</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14809" ref_url="https://www.suse.com/security/cve/CVE-2019-14809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005839.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" source="SUSE-SU"/>
    <description>
    net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-14809/">CVE-2019-14809</cve>
	<bugzilla href="https://bugzilla.suse.com/1146123">SUSE bug 1146123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602650" comment="go1.11-1.11.13-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242156" comment="go1.11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602651" comment="go1.11-doc-1.11.13-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242158" comment="go1.11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602652" comment="go1.11-race-1.11.13-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242160" comment="go1.11-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602709" comment="go1.12-1.12.9-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602710" comment="go1.12-doc-1.12.9-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602711" comment="go1.12-race-1.12.9-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14811</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603086" comment="ghostscript-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603087" comment="ghostscript-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603088" comment="ghostscript-mini-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603089" comment="ghostscript-mini-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603090" comment="ghostscript-x11-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603086" comment="ghostscript-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603087" comment="ghostscript-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603088" comment="ghostscript-mini-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603089" comment="ghostscript-mini-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603090" comment="ghostscript-x11-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14813</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603086" comment="ghostscript-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603087" comment="ghostscript-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603088" comment="ghostscript-mini-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603089" comment="ghostscript-mini-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603090" comment="ghostscript-x11-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14814</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173664">SUSE bug 1173664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14815</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14816</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173666">SUSE bug 1173666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14817</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603086" comment="ghostscript-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603087" comment="ghostscript-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603088" comment="ghostscript-mini-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603089" comment="ghostscript-mini-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603090" comment="ghostscript-x11-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14821</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-&gt;first' and 'ring-&gt;last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603277" comment="kernel-debug-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603278" comment="kernel-debug-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603279" comment="kernel-debug-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603280" comment="kernel-default-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603281" comment="kernel-default-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603282" comment="kernel-default-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603283" comment="kernel-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603284" comment="kernel-docs-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603285" comment="kernel-docs-html-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603286" comment="kernel-kvmsmall-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603287" comment="kernel-kvmsmall-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603288" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603289" comment="kernel-macros-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603290" comment="kernel-obs-build-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603291" comment="kernel-obs-qa-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603292" comment="kernel-source-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603293" comment="kernel-source-vanilla-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603294" comment="kernel-syms-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603295" comment="kernel-vanilla-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603296" comment="kernel-vanilla-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603297" comment="kernel-vanilla-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14822</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00074.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603022" comment="ibus-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265415" comment="ibus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603023" comment="ibus-devel-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265417" comment="ibus-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603024" comment="ibus-gtk-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265418" comment="ibus-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603025" comment="ibus-gtk-32bit-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265419" comment="ibus-gtk-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603026" comment="ibus-gtk3-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265420" comment="ibus-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603027" comment="ibus-gtk3-32bit-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265421" comment="ibus-gtk3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603028" comment="ibus-lang-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265422" comment="ibus-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603029" comment="libibus-1_0-5-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265423" comment="libibus-1_0-5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603030" comment="libibus-1_0-5-32bit-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265424" comment="libibus-1_0-5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603031" comment="python-ibus-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265425" comment="python-ibus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603032" comment="typelib-1_0-IBus-1_0-1.5.19-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265427" comment="typelib-1_0-IBus-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14833</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14833" ref_url="https://www.suse.com/security/cve/CVE-2019-14833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2866-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192866-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2868-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192868-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14833/">CVE-2019-14833</cve>
	<bugzilla href="https://bugzilla.suse.com/1154289">SUSE bug 1154289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603497" comment="ctdb-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603498" comment="ctdb-pcp-pmda-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603499" comment="ctdb-tests-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603500" comment="libdcerpc-binding0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603501" comment="libdcerpc-binding0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603502" comment="libdcerpc-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603503" comment="libdcerpc-samr-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603504" comment="libdcerpc-samr0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603505" comment="libdcerpc-samr0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603506" comment="libdcerpc0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603507" comment="libdcerpc0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603508" comment="libndr-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603509" comment="libndr-krb5pac-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603510" comment="libndr-krb5pac0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603511" comment="libndr-krb5pac0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603512" comment="libndr-nbt-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603513" comment="libndr-nbt0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603514" comment="libndr-nbt0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603515" comment="libndr-standard-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603516" comment="libndr-standard0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603517" comment="libndr-standard0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603518" comment="libndr0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603519" comment="libndr0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603520" comment="libnetapi-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603521" comment="libnetapi0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603522" comment="libnetapi0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603523" comment="libsamba-credentials-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603524" comment="libsamba-credentials0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603525" comment="libsamba-credentials0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603526" comment="libsamba-errors-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603527" comment="libsamba-errors0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603528" comment="libsamba-errors0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603529" comment="libsamba-hostconfig-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603530" comment="libsamba-hostconfig0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603531" comment="libsamba-hostconfig0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603532" comment="libsamba-passdb-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603533" comment="libsamba-passdb0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603534" comment="libsamba-passdb0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603535" comment="libsamba-policy-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603536" comment="libsamba-policy-python-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603537" comment="libsamba-policy-python3-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603538" comment="libsamba-policy0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603539" comment="libsamba-policy0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603540" comment="libsamba-policy0-python3-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603541" comment="libsamba-policy0-python3-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603542" comment="libsamba-util-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603543" comment="libsamba-util0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603544" comment="libsamba-util0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603545" comment="libsamdb-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603546" comment="libsamdb0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603547" comment="libsamdb0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603548" comment="libsmbclient-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603549" comment="libsmbclient0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603550" comment="libsmbclient0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603551" comment="libsmbconf-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603552" comment="libsmbconf0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603553" comment="libsmbconf0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603554" comment="libsmbldap-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603555" comment="libsmbldap2-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603556" comment="libsmbldap2-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603557" comment="libtevent-util-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603558" comment="libtevent-util0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603559" comment="libtevent-util0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603560" comment="libwbclient-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603561" comment="libwbclient0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603562" comment="libwbclient0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603563" comment="samba-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603564" comment="samba-ad-dc-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603565" comment="samba-ad-dc-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603566" comment="samba-ceph-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603567" comment="samba-client-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603568" comment="samba-client-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603569" comment="samba-core-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603570" comment="samba-doc-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603571" comment="samba-dsdb-modules-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603572" comment="samba-libs-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603573" comment="samba-libs-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603574" comment="samba-libs-python-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603575" comment="samba-libs-python-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603576" comment="samba-libs-python3-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603577" comment="samba-libs-python3-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603578" comment="samba-pidl-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603579" comment="samba-python-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603580" comment="samba-python3-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603581" comment="samba-test-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603582" comment="samba-winbind-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603583" comment="samba-winbind-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14834</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14834" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00027.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834</cve>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603877" comment="dnsmasq-2.78-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603878" comment="dnsmasq-utils-2.78-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14835</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
    <description>
    In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846</cve>
	<bugzilla href="https://bugzilla.suse.com/1153452">SUSE bug 1153452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607522" comment="ansible-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607523" comment="ansible-doc-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607524" comment="ansible-test-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14847</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14847" ref_url="https://www.suse.com/security/cve/CVE-2019-14847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2866-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192866-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2868-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192868-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in denial of service. Privilege escalation is not possible with this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14847/">CVE-2019-14847</cve>
	<bugzilla href="https://bugzilla.suse.com/1154598">SUSE bug 1154598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603497" comment="ctdb-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603498" comment="ctdb-pcp-pmda-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603499" comment="ctdb-tests-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603500" comment="libdcerpc-binding0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603501" comment="libdcerpc-binding0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603502" comment="libdcerpc-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603503" comment="libdcerpc-samr-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603504" comment="libdcerpc-samr0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603505" comment="libdcerpc-samr0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603506" comment="libdcerpc0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603507" comment="libdcerpc0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603508" comment="libndr-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603509" comment="libndr-krb5pac-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603510" comment="libndr-krb5pac0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603511" comment="libndr-krb5pac0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603512" comment="libndr-nbt-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603513" comment="libndr-nbt0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603514" comment="libndr-nbt0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603515" comment="libndr-standard-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603516" comment="libndr-standard0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603517" comment="libndr-standard0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603518" comment="libndr0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603519" comment="libndr0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603520" comment="libnetapi-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603521" comment="libnetapi0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603522" comment="libnetapi0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603523" comment="libsamba-credentials-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603524" comment="libsamba-credentials0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603525" comment="libsamba-credentials0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603526" comment="libsamba-errors-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603527" comment="libsamba-errors0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603528" comment="libsamba-errors0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603529" comment="libsamba-hostconfig-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603530" comment="libsamba-hostconfig0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603531" comment="libsamba-hostconfig0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603532" comment="libsamba-passdb-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603533" comment="libsamba-passdb0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603534" comment="libsamba-passdb0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603535" comment="libsamba-policy-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603536" comment="libsamba-policy-python-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603537" comment="libsamba-policy-python3-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603538" comment="libsamba-policy0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603539" comment="libsamba-policy0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603540" comment="libsamba-policy0-python3-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603541" comment="libsamba-policy0-python3-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603542" comment="libsamba-util-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603543" comment="libsamba-util0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603544" comment="libsamba-util0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603545" comment="libsamdb-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603546" comment="libsamdb0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603547" comment="libsamdb0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603548" comment="libsmbclient-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603549" comment="libsmbclient0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603550" comment="libsmbclient0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603551" comment="libsmbconf-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603552" comment="libsmbconf0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603553" comment="libsmbconf0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603554" comment="libsmbldap-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603555" comment="libsmbldap2-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603556" comment="libsmbldap2-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603557" comment="libtevent-util-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603558" comment="libtevent-util0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603559" comment="libtevent-util0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603560" comment="libwbclient-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603561" comment="libwbclient0-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603562" comment="libwbclient0-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603563" comment="samba-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603564" comment="samba-ad-dc-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603565" comment="samba-ad-dc-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603566" comment="samba-ceph-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603567" comment="samba-client-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603568" comment="samba-client-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603569" comment="samba-core-devel-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603570" comment="samba-doc-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603571" comment="samba-dsdb-modules-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603572" comment="samba-libs-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603573" comment="samba-libs-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603574" comment="samba-libs-python-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603575" comment="samba-libs-python-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603576" comment="samba-libs-python3-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603577" comment="samba-libs-python3-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603578" comment="samba-pidl-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603579" comment="samba-python-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603580" comment="samba-python3-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603581" comment="samba-test-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603582" comment="samba-winbind-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603583" comment="samba-winbind-32bit-4.9.5+git.210.ab0549acb05-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14853</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14853" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00023.html" source="SUSE-SU"/>
    <description>
    An error-handling flaw was found in python-ecdsa before version 0.13.3. During signature decoding, malformed DER signatures could raise unexpected exceptions (or no exceptions at all), which could lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853</cve>
	<bugzilla href="https://bugzilla.suse.com/1153165">SUSE bug 1153165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603616" comment="python2-ecdsa-0.13.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270409" comment="python2-ecdsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603617" comment="python3-ecdsa-0.13.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270410" comment="python3-ecdsa is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14856</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14856" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
    <description>
    ansible before versions 2.8.6, 2.7.14, 2.6.20 is vulnerable to a None
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856</cve>
	<bugzilla href="https://bugzilla.suse.com/1154232">SUSE bug 1154232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607522" comment="ansible-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607523" comment="ansible-doc-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607524" comment="ansible-test-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14857</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14857" ref_url="https://www.suse.com/security/cve/CVE-2019-14857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00030.html" source="SUSE-SU"/>
    <description>
    A flaw was found in mod_auth_openidc before version 2.4.0.1. An open redirect issue exists in URLs with trailing slashes similar to CVE-2019-3877 in mod_auth_mellon.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14857/">CVE-2019-14857</cve>
	<bugzilla href="https://bugzilla.suse.com/1153666">SUSE bug 1153666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603625" comment="apache2-mod_auth_openidc-2.3.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270746" comment="apache2-mod_auth_openidc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14858</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14858" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858</cve>
	<bugzilla href="https://bugzilla.suse.com/1154231">SUSE bug 1154231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607522" comment="ansible-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607523" comment="ansible-doc-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607524" comment="ansible-test-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14859</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14859" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00023.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859</cve>
	<bugzilla href="https://bugzilla.suse.com/1154217">SUSE bug 1154217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603616" comment="python2-ecdsa-0.13.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270409" comment="python2-ecdsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603617" comment="python3-ecdsa-0.13.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270410" comment="python3-ecdsa is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14861</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14861" ref_url="https://www.suse.com/security/cve/CVE-2019-14861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3318-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193318-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" source="SUSE-SU"/>
    <description>
    All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permissions on the DNS partition allow creation of new records by authenticated users. This is used for example to allow machines to self-register in DNS. If a DNS record was created that case-insensitively matched the name of the zone, the ldb_qsort() and dns_name_compare() routines could be confused into reading memory prior to the list of DNS entries when responding to DnssrvEnumRecords() or DnssrvEnumRecords2() and so following invalid memory as a pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14861/">CVE-2019-14861</cve>
	<bugzilla href="https://bugzilla.suse.com/1158108">SUSE bug 1158108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603941" comment="ctdb-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603942" comment="ctdb-pcp-pmda-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603943" comment="ctdb-tests-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603944" comment="libdcerpc-binding0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603945" comment="libdcerpc-binding0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603946" comment="libdcerpc-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603947" comment="libdcerpc-samr-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603948" comment="libdcerpc-samr0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603949" comment="libdcerpc-samr0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603950" comment="libdcerpc0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603951" comment="libdcerpc0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603952" comment="libndr-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603953" comment="libndr-krb5pac-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603954" comment="libndr-krb5pac0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603955" comment="libndr-krb5pac0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603956" comment="libndr-nbt-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603957" comment="libndr-nbt0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603958" comment="libndr-nbt0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603959" comment="libndr-standard-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603960" comment="libndr-standard0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603961" comment="libndr-standard0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603962" comment="libndr0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603963" comment="libndr0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603964" comment="libnetapi-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603965" comment="libnetapi0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603966" comment="libnetapi0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603967" comment="libsamba-credentials-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603968" comment="libsamba-credentials0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603969" comment="libsamba-credentials0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603970" comment="libsamba-errors-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603971" comment="libsamba-errors0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603972" comment="libsamba-errors0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603973" comment="libsamba-hostconfig-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603974" comment="libsamba-hostconfig0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603975" comment="libsamba-hostconfig0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603976" comment="libsamba-passdb-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603977" comment="libsamba-passdb0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603978" comment="libsamba-passdb0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603979" comment="libsamba-policy-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603980" comment="libsamba-policy-python-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603981" comment="libsamba-policy-python3-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603982" comment="libsamba-policy0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603983" comment="libsamba-policy0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603984" comment="libsamba-policy0-python3-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603985" comment="libsamba-policy0-python3-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603986" comment="libsamba-util-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603987" comment="libsamba-util0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603988" comment="libsamba-util0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603989" comment="libsamdb-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603990" comment="libsamdb0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603991" comment="libsamdb0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603992" comment="libsmbclient-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603993" comment="libsmbclient0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603994" comment="libsmbclient0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603995" comment="libsmbconf-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603996" comment="libsmbconf0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603997" comment="libsmbconf0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603998" comment="libsmbldap-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603999" comment="libsmbldap2-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604000" comment="libsmbldap2-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604001" comment="libtevent-util-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604002" comment="libtevent-util0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604003" comment="libtevent-util0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604004" comment="libwbclient-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604005" comment="libwbclient0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604006" comment="libwbclient0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604007" comment="samba-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604008" comment="samba-ad-dc-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604009" comment="samba-ad-dc-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604010" comment="samba-ceph-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604011" comment="samba-client-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604012" comment="samba-client-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604013" comment="samba-core-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604014" comment="samba-doc-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604015" comment="samba-dsdb-modules-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604016" comment="samba-libs-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604017" comment="samba-libs-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604018" comment="samba-libs-python-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604019" comment="samba-libs-python-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604020" comment="samba-libs-python3-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604021" comment="samba-libs-python3-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604022" comment="samba-pidl-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604023" comment="samba-python-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604024" comment="samba-python3-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604025" comment="samba-test-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604026" comment="samba-winbind-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604027" comment="samba-winbind-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14864</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14864" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
    <description>
    Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864</cve>
	<bugzilla href="https://bugzilla.suse.com/1154830">SUSE bug 1154830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607522" comment="ansible-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607523" comment="ansible-doc-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607524" comment="ansible-test-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14866</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00076.html" source="SUSE-SU"/>
    <description>
    In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866</cve>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603814" comment="cpio-2.12-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151389" comment="cpio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603815" comment="cpio-lang-2.12-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151390" comment="cpio-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603816" comment="cpio-mt-2.12-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177165" comment="cpio-mt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14869</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603737" comment="ghostscript-9.27-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603738" comment="ghostscript-devel-9.27-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603739" comment="ghostscript-mini-9.27-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603740" comment="ghostscript-mini-devel-9.27-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603741" comment="ghostscript-x11-9.27-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14870</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14870" ref_url="https://www.suse.com/security/cve/CVE-2019-14870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3318-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193318-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" source="SUSE-SU"/>
    <description>
    All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14870/">CVE-2019-14870</cve>
	<bugzilla href="https://bugzilla.suse.com/1158109">SUSE bug 1158109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603941" comment="ctdb-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603942" comment="ctdb-pcp-pmda-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603943" comment="ctdb-tests-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603944" comment="libdcerpc-binding0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603945" comment="libdcerpc-binding0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603946" comment="libdcerpc-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603947" comment="libdcerpc-samr-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603948" comment="libdcerpc-samr0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603949" comment="libdcerpc-samr0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603950" comment="libdcerpc0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603951" comment="libdcerpc0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603952" comment="libndr-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603953" comment="libndr-krb5pac-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603954" comment="libndr-krb5pac0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603955" comment="libndr-krb5pac0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603956" comment="libndr-nbt-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603957" comment="libndr-nbt0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603958" comment="libndr-nbt0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603959" comment="libndr-standard-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603960" comment="libndr-standard0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603961" comment="libndr-standard0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603962" comment="libndr0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603963" comment="libndr0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603964" comment="libnetapi-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603965" comment="libnetapi0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603966" comment="libnetapi0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603967" comment="libsamba-credentials-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603968" comment="libsamba-credentials0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603969" comment="libsamba-credentials0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603970" comment="libsamba-errors-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603971" comment="libsamba-errors0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603972" comment="libsamba-errors0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603973" comment="libsamba-hostconfig-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603974" comment="libsamba-hostconfig0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603975" comment="libsamba-hostconfig0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603976" comment="libsamba-passdb-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603977" comment="libsamba-passdb0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603978" comment="libsamba-passdb0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603979" comment="libsamba-policy-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603980" comment="libsamba-policy-python-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603981" comment="libsamba-policy-python3-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603982" comment="libsamba-policy0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603983" comment="libsamba-policy0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603984" comment="libsamba-policy0-python3-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603985" comment="libsamba-policy0-python3-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603986" comment="libsamba-util-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603987" comment="libsamba-util0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603988" comment="libsamba-util0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603989" comment="libsamdb-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603990" comment="libsamdb0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603991" comment="libsamdb0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603992" comment="libsmbclient-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603993" comment="libsmbclient0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603994" comment="libsmbclient0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603995" comment="libsmbconf-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603996" comment="libsmbconf0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603997" comment="libsmbconf0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603998" comment="libsmbldap-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603999" comment="libsmbldap2-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604000" comment="libsmbldap2-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604001" comment="libtevent-util-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604002" comment="libtevent-util0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604003" comment="libtevent-util0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604004" comment="libwbclient-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604005" comment="libwbclient0-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604006" comment="libwbclient0-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604007" comment="samba-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604008" comment="samba-ad-dc-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604009" comment="samba-ad-dc-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604010" comment="samba-ceph-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604011" comment="samba-client-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604012" comment="samba-client-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604013" comment="samba-core-devel-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604014" comment="samba-doc-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604015" comment="samba-dsdb-modules-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604016" comment="samba-libs-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604017" comment="samba-libs-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604018" comment="samba-libs-python-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604019" comment="samba-libs-python-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604020" comment="samba-libs-python3-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604021" comment="samba-libs-python3-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604022" comment="samba-pidl-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604023" comment="samba-python-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604024" comment="samba-python3-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604025" comment="samba-test-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604026" comment="samba-winbind-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604027" comment="samba-winbind-32bit-4.9.5+git.224.86a8e66adea-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14889</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14889" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:21-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2689-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00047.html" source="SUSE-SU"/>
    <description>
    A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889</cve>
	<bugzilla href="https://bugzilla.suse.com/1158095">SUSE bug 1158095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604361" comment="libssh-devel-0.8.7-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604362" comment="libssh4-0.8.7-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604363" comment="libssh4-32bit-0.8.7-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153278" comment="libssh4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14895</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173660">SUSE bug 1173660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14896</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14896" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14897</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14897" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14901</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14902</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14902" ref_url="https://www.suse.com/security/cve/CVE-2019-14902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" source="SUSE-SU"/>
    <description>
    There is an issue in all samba 4.11.x versions before 4.11.5, all samba 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18, where the removal of the right to create or modify a subtree would not automatically be taken away on all domain controllers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14902/">CVE-2019-14902</cve>
	<bugzilla href="https://bugzilla.suse.com/1160850">SUSE bug 1160850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604630" comment="ctdb-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604631" comment="ctdb-pcp-pmda-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604632" comment="ctdb-tests-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604633" comment="libdcerpc-binding0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604634" comment="libdcerpc-binding0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604635" comment="libdcerpc-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604636" comment="libdcerpc-samr-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604637" comment="libdcerpc-samr0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604638" comment="libdcerpc-samr0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604639" comment="libdcerpc0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604640" comment="libdcerpc0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604641" comment="libndr-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604642" comment="libndr-krb5pac-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604643" comment="libndr-krb5pac0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604644" comment="libndr-krb5pac0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604645" comment="libndr-nbt-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604646" comment="libndr-nbt0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604647" comment="libndr-nbt0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604648" comment="libndr-standard-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604649" comment="libndr-standard0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604650" comment="libndr-standard0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604651" comment="libndr0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604652" comment="libndr0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604653" comment="libnetapi-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604654" comment="libnetapi0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604655" comment="libnetapi0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604656" comment="libsamba-credentials-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604657" comment="libsamba-credentials0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604658" comment="libsamba-credentials0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604659" comment="libsamba-errors-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604660" comment="libsamba-errors0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604661" comment="libsamba-errors0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604662" comment="libsamba-hostconfig-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604663" comment="libsamba-hostconfig0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604664" comment="libsamba-hostconfig0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604665" comment="libsamba-passdb-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604666" comment="libsamba-passdb0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604667" comment="libsamba-passdb0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604668" comment="libsamba-policy-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604669" comment="libsamba-policy-python-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604670" comment="libsamba-policy-python3-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604671" comment="libsamba-policy0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604672" comment="libsamba-policy0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604673" comment="libsamba-policy0-python3-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604674" comment="libsamba-policy0-python3-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604675" comment="libsamba-util-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604676" comment="libsamba-util0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604677" comment="libsamba-util0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604678" comment="libsamdb-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604679" comment="libsamdb0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604680" comment="libsamdb0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604681" comment="libsmbclient-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604682" comment="libsmbclient0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604683" comment="libsmbclient0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604684" comment="libsmbconf-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604685" comment="libsmbconf0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604686" comment="libsmbconf0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604687" comment="libsmbldap-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604688" comment="libsmbldap2-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604689" comment="libsmbldap2-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604690" comment="libtevent-util-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604691" comment="libtevent-util0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604692" comment="libtevent-util0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604693" comment="libwbclient-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604694" comment="libwbclient0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604695" comment="libwbclient0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604696" comment="samba-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604697" comment="samba-ad-dc-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604698" comment="samba-ad-dc-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604699" comment="samba-ceph-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604700" comment="samba-client-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604701" comment="samba-client-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604702" comment="samba-core-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604703" comment="samba-doc-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604704" comment="samba-dsdb-modules-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604705" comment="samba-libs-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604706" comment="samba-libs-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604707" comment="samba-libs-python-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604708" comment="samba-libs-python-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604709" comment="samba-libs-python3-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604710" comment="samba-libs-python3-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604711" comment="samba-pidl-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604712" comment="samba-python-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604713" comment="samba-python3-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604714" comment="samba-test-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604715" comment="samba-winbind-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604716" comment="samba-winbind-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14904</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14904" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904</cve>
	<bugzilla href="https://bugzilla.suse.com/1157968">SUSE bug 1157968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607522" comment="ansible-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607523" comment="ansible-doc-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607524" comment="ansible-test-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14905</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14905" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905</cve>
	<bugzilla href="https://bugzilla.suse.com/1157969">SUSE bug 1157969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607522" comment="ansible-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607523" comment="ansible-doc-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281504" comment="ansible-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607524" comment="ansible-test-2.9.6-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281505" comment="ansible-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14907</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" source="SUSE-SU"/>
    <description>
    All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907</cve>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604630" comment="ctdb-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604631" comment="ctdb-pcp-pmda-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604632" comment="ctdb-tests-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604633" comment="libdcerpc-binding0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604634" comment="libdcerpc-binding0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604635" comment="libdcerpc-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604636" comment="libdcerpc-samr-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604637" comment="libdcerpc-samr0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604638" comment="libdcerpc-samr0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604639" comment="libdcerpc0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604640" comment="libdcerpc0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604641" comment="libndr-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604642" comment="libndr-krb5pac-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604643" comment="libndr-krb5pac0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604644" comment="libndr-krb5pac0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604645" comment="libndr-nbt-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604646" comment="libndr-nbt0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604647" comment="libndr-nbt0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604648" comment="libndr-standard-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604649" comment="libndr-standard0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604650" comment="libndr-standard0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604651" comment="libndr0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604652" comment="libndr0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604653" comment="libnetapi-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604654" comment="libnetapi0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604655" comment="libnetapi0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604656" comment="libsamba-credentials-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604657" comment="libsamba-credentials0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604658" comment="libsamba-credentials0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604659" comment="libsamba-errors-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604660" comment="libsamba-errors0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604661" comment="libsamba-errors0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604662" comment="libsamba-hostconfig-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604663" comment="libsamba-hostconfig0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604664" comment="libsamba-hostconfig0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604665" comment="libsamba-passdb-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604666" comment="libsamba-passdb0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604667" comment="libsamba-passdb0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604668" comment="libsamba-policy-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604669" comment="libsamba-policy-python-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604670" comment="libsamba-policy-python3-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604671" comment="libsamba-policy0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604672" comment="libsamba-policy0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604673" comment="libsamba-policy0-python3-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604674" comment="libsamba-policy0-python3-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604675" comment="libsamba-util-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604676" comment="libsamba-util0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604677" comment="libsamba-util0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604678" comment="libsamdb-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604679" comment="libsamdb0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604680" comment="libsamdb0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604681" comment="libsmbclient-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604682" comment="libsmbclient0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604683" comment="libsmbclient0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604684" comment="libsmbconf-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604685" comment="libsmbconf0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604686" comment="libsmbconf0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604687" comment="libsmbldap-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604688" comment="libsmbldap2-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604689" comment="libsmbldap2-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604690" comment="libtevent-util-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604691" comment="libtevent-util0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604692" comment="libtevent-util0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604693" comment="libwbclient-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604694" comment="libwbclient0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604695" comment="libwbclient0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604696" comment="samba-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604697" comment="samba-ad-dc-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604698" comment="samba-ad-dc-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604699" comment="samba-ceph-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604700" comment="samba-client-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604701" comment="samba-client-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604702" comment="samba-core-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604703" comment="samba-doc-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604704" comment="samba-dsdb-modules-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604705" comment="samba-libs-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604706" comment="samba-libs-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604707" comment="samba-libs-python-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604708" comment="samba-libs-python-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604709" comment="samba-libs-python3-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604710" comment="samba-libs-python3-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604711" comment="samba-pidl-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604712" comment="samba-python-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604713" comment="samba-python3-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604714" comment="samba-test-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604715" comment="samba-winbind-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604716" comment="samba-winbind-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14970</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14970" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14970" ref_url="https://www.suse.com/security/cve/CVE-2019-14970" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html" source="SUSE-SU"/>
    <description>
    A vulnerability in mkv::event_thread_t in VideoLAN VLC media player 3.0.7.1 allows remote attackers to trigger a heap-based buffer overflow via a crafted .mkv file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14970/">CVE-2019-14970</cve>
	<bugzilla href="https://bugzilla.suse.com/1146428">SUSE bug 1146428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607583" comment="libvlc5-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607584" comment="libvlccore9-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607585" comment="vlc-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607586" comment="vlc-codec-gstreamer-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607587" comment="vlc-devel-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607588" comment="vlc-jack-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607589" comment="vlc-lang-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607590" comment="vlc-noX-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607591" comment="vlc-opencv-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607592" comment="vlc-qt-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607593" comment="vlc-vdpau-3.0.9.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1561-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00023.html" source="SUSE-SU"/>
    <description>
    _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973</cve>
	<bugzilla href="https://bugzilla.suse.com/1146608">SUSE bug 1146608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605978" comment="libtiff-devel-4.0.9-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605979" comment="libtiff-devel-32bit-4.0.9-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152222" comment="libtiff-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605980" comment="libtiff5-4.0.9-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605981" comment="libtiff5-32bit-4.0.9-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151318" comment="libtiff5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605982" comment="tiff-4.0.9-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14980</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14980" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980</cve>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14981</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981</cve>
	<bugzilla href="https://bugzilla.suse.com/1146065">SUSE bug 1146065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15026</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15026" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15026" ref_url="https://www.suse.com/security/cve/CVE-2019-15026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html" source="SUSE-SU"/>
    <description>
    memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15026/">CVE-2019-15026</cve>
	<bugzilla href="https://bugzilla.suse.com/1149110">SUSE bug 1149110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608183" comment="memcached-1.5.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153862" comment="memcached is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608184" comment="memcached-devel-1.5.6-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153863" comment="memcached-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15030</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15031</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15031" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15034</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15034" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15034" ref_url="https://www.suse.com/security/cve/CVE-2019-15034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15034/">CVE-2019-15034</cve>
	<bugzilla href="https://bugzilla.suse.com/1166379">SUSE bug 1166379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607382" comment="qemu-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607383" comment="qemu-arm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607384" comment="qemu-audio-alsa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607385" comment="qemu-audio-oss-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607386" comment="qemu-audio-pa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607387" comment="qemu-audio-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607388" comment="qemu-block-curl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607389" comment="qemu-block-dmg-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607390" comment="qemu-block-gluster-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607391" comment="qemu-block-iscsi-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607392" comment="qemu-block-nfs-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607393" comment="qemu-block-rbd-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607394" comment="qemu-block-ssh-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607395" comment="qemu-extra-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607396" comment="qemu-guest-agent-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607397" comment="qemu-ipxe-1.0.0+-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607398" comment="qemu-ksm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607399" comment="qemu-kvm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607400" comment="qemu-lang-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607401" comment="qemu-linux-user-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607402" comment="qemu-ppc-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607403" comment="qemu-s390-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607404" comment="qemu-seabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607405" comment="qemu-sgabios-8-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607406" comment="qemu-tools-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607407" comment="qemu-ui-curses-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607408" comment="qemu-ui-gtk-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607409" comment="qemu-ui-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607410" comment="qemu-vgabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607411" comment="qemu-x86-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15090</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15090" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15090" ref_url="https://www.suse.com/security/cve/CVE-2019-15090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15090/">CVE-2019-15090</cve>
	<bugzilla href="https://bugzilla.suse.com/1146399">SUSE bug 1146399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15098</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15099</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15099" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<bugzilla href="https://bugzilla.suse.com/1146368">SUSE bug 1146368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15117</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173934">SUSE bug 1173934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15118</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15140</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15141</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15141" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_dirwrite.c of LibTIFF. NOTE: this occurs because of an incomplete fix for CVE-2019-11597.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15142</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" source="SUSE-SU"/>
    <description>
    In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142</cve>
	<bugzilla href="https://bugzilla.suse.com/1146702">SUSE bug 1146702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603082" comment="djvulibre-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603083" comment="djvulibre-doc-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603084" comment="libdjvulibre-devel-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603085" comment="libdjvulibre21-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15143</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" source="SUSE-SU"/>
    <description>
    In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143</cve>
	<bugzilla href="https://bugzilla.suse.com/1146569">SUSE bug 1146569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603082" comment="djvulibre-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603083" comment="djvulibre-doc-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603084" comment="libdjvulibre-devel-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603085" comment="libdjvulibre21-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15144</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" source="SUSE-SU"/>
    <description>
    In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate&lt;TYPE&gt;::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144</cve>
	<bugzilla href="https://bugzilla.suse.com/1146571">SUSE bug 1146571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603082" comment="djvulibre-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603083" comment="djvulibre-doc-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603084" comment="libdjvulibre-devel-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603085" comment="libdjvulibre21-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" source="SUSE-SU"/>
    <description>
    DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145</cve>
	<bugzilla href="https://bugzilla.suse.com/1146572">SUSE bug 1146572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603082" comment="djvulibre-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603083" comment="djvulibre-doc-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603084" comment="libdjvulibre-devel-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603085" comment="libdjvulibre21-3.5.27-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15165</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15165" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html" source="SUSE-SU"/>
    <description>
    sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603321" comment="libpcap-devel-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603322" comment="libpcap-devel-32bit-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155208" comment="libpcap-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603323" comment="libpcap-devel-static-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603324" comment="libpcap1-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603325" comment="libpcap1-32bit-1.8.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155214" comment="libpcap1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15166</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15166" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15167</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15167" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15167" ref_url="https://www.suse.com/security/cve/CVE-2019-15167" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15167/">CVE-2019-15167</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603326" comment="tcpdump-4.9.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15211</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15211" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15212</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15212" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15213</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15214</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146550">SUSE bug 1146550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15215" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15216</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15216" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15217</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15218</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15219</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15219" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15220</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146526">SUSE bug 1146526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15221</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15222</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15222" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15222" ref_url="https://www.suse.com/security/cve/CVE-2019-15222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15222/">CVE-2019-15222</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146531">SUSE bug 1146531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15239</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239</cve>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15290</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15290" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15291</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603277" comment="kernel-debug-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603278" comment="kernel-debug-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603279" comment="kernel-debug-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603280" comment="kernel-default-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603281" comment="kernel-default-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603282" comment="kernel-default-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603283" comment="kernel-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603284" comment="kernel-docs-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603285" comment="kernel-docs-html-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603286" comment="kernel-kvmsmall-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603287" comment="kernel-kvmsmall-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603288" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603289" comment="kernel-macros-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603290" comment="kernel-obs-build-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603291" comment="kernel-obs-qa-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603292" comment="kernel-source-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603293" comment="kernel-source-vanilla-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603294" comment="kernel-syms-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603295" comment="kernel-vanilla-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603296" comment="kernel-vanilla-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603297" comment="kernel-vanilla-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15292</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15292" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a use-after-free in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292</cve>
	<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173939">SUSE bug 1173939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543</cve>
	<bugzilla href="https://bugzilla.suse.com/1128189">SUSE bug 1128189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1547</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154166">SUSE bug 1154166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161085">SUSE bug 1161085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603166" comment="libopenssl-1_0_0-devel-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231070" comment="libopenssl-1_0_0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603167" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231071" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602840" comment="libopenssl-1_1-devel-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602841" comment="libopenssl-1_1-devel-32bit-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603168" comment="libopenssl1_0_0-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603169" comment="libopenssl1_0_0-32bit-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603170" comment="libopenssl1_0_0-hmac-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603171" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603172" comment="libopenssl1_0_0-steam-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171502" comment="libopenssl1_0_0-steam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603173" comment="libopenssl1_0_0-steam-32bit-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171503" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602842" comment="libopenssl1_1-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602843" comment="libopenssl1_1-32bit-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602844" comment="libopenssl1_1-hmac-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602845" comment="libopenssl1_1-hmac-32bit-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603174" comment="openssl-1_0_0-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231076" comment="openssl-1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603175" comment="openssl-1_0_0-cavs-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231077" comment="openssl-1_0_0-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603176" comment="openssl-1_0_0-doc-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231078" comment="openssl-1_0_0-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602846" comment="openssl-1_1-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602847" comment="openssl-1_1-doc-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1551</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html" source="SUSE-SU"/>
    <description>
    There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607826" comment="libopenssl-1_0_0-devel-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231070" comment="libopenssl-1_0_0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607827" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231071" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607837" comment="libopenssl-1_1-devel-1.1.0i-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607838" comment="libopenssl-1_1-devel-32bit-1.1.0i-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607828" comment="libopenssl1_0_0-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607829" comment="libopenssl1_0_0-32bit-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607830" comment="libopenssl1_0_0-hmac-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607831" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607832" comment="libopenssl1_0_0-steam-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171502" comment="libopenssl1_0_0-steam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607833" comment="libopenssl1_0_0-steam-32bit-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171503" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607839" comment="libopenssl1_1-1.1.0i-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607840" comment="libopenssl1_1-32bit-1.1.0i-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607841" comment="libopenssl1_1-hmac-1.1.0i-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607842" comment="libopenssl1_1-hmac-32bit-1.1.0i-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607834" comment="openssl-1_0_0-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231076" comment="openssl-1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607835" comment="openssl-1_0_0-cavs-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231077" comment="openssl-1_0_0-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607836" comment="openssl-1_0_0-doc-1.0.2p-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231078" comment="openssl-1_0_0-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607843" comment="openssl-1_1-1.1.0i-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607844" comment="openssl-1_1-doc-1.1.0i-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15538</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15538" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15538" ref_url="https://www.suse.com/security/cve/CVE-2019-15538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vector, but it might result as well in remote DoS if the XFS filesystem is exported for instance via NFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15538/">CVE-2019-15538</cve>
	<bugzilla href="https://bugzilla.suse.com/1148093">SUSE bug 1148093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15540" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15540" ref_url="https://www.suse.com/security/cve/CVE-2019-15540" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00017.html" source="SUSE-SU"/>
    <description>
    filters/filter-cso/filter-stream.c in the CSO filter in libMirage 3.2.2 in CDemu does not validate the part size, triggering a heap-based buffer overflow that can lead to root access by a local Linux user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15540/">CVE-2019-15540</cve>
	<bugzilla href="https://bugzilla.suse.com/1148087">SUSE bug 1148087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602537" comment="libmirage-3_2-3.2.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263214" comment="libmirage-3_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602538" comment="libmirage-data-3.2.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263215" comment="libmirage-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602539" comment="libmirage-devel-3.2.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263216" comment="libmirage-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602540" comment="libmirage-lang-3.2.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263217" comment="libmirage-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602541" comment="libmirage11-3.2.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263218" comment="libmirage11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602542" comment="typelib-1_0-libmirage-3_2-3.2.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263219" comment="typelib-1_0-libmirage-3_2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1559</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00173.html" source="SUSE-SU"/>
    <description>
    If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601274" comment="libopenssl-1_0_0-devel-1.0.2p-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231070" comment="libopenssl-1_0_0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601275" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231071" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601276" comment="libopenssl1_0_0-1.0.2p-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601277" comment="libopenssl1_0_0-32bit-1.0.2p-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601278" comment="libopenssl1_0_0-hmac-1.0.2p-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601279" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601280" comment="openssl-1_0_0-1.0.2p-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231076" comment="openssl-1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601281" comment="openssl-1_0_0-cavs-1.0.2p-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231077" comment="openssl-1_0_0-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601282" comment="openssl-1_0_0-doc-1.0.2p-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231078" comment="openssl-1_0_0-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15604</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15604" ref_url="https://www.suse.com/security/cve/CVE-2019-15604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html" source="SUSE-SU"/>
    <description>
    Improper Certificate Validation in Node.js 10, 12, and 13 causes the process to abort when sending a crafted X.509 certificate
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15604/">CVE-2019-15604</cve>
	<bugzilla href="https://bugzilla.suse.com/1163104">SUSE bug 1163104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607004" comment="nodejs8-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607005" comment="nodejs8-devel-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607006" comment="nodejs8-docs-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607007" comment="npm8-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15605</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html" source="SUSE-SU"/>
    <description>
    HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605</cve>
	<bugzilla href="https://bugzilla.suse.com/1163102">SUSE bug 1163102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607004" comment="nodejs8-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607005" comment="nodejs8-devel-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607006" comment="nodejs8-docs-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607007" comment="npm8-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15606</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15606" ref_url="https://www.suse.com/security/cve/CVE-2019-15606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html" source="SUSE-SU"/>
    <description>
    Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15606/">CVE-2019-15606</cve>
	<bugzilla href="https://bugzilla.suse.com/1163103">SUSE bug 1163103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607004" comment="nodejs8-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607005" comment="nodejs8-devel-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607006" comment="nodejs8-docs-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607007" comment="npm8-8.17.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15613</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15613" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15613" ref_url="https://www.suse.com/security/cve/CVE-2019-15613" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html" source="SUSE-SU"/>
    <description>
    A bug in Nextcloud Server 17.0.1 causes the workflow rules to depend their behaviour on the file extension when checking file mimetypes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15613/">CVE-2019-15613</cve>
	<bugzilla href="https://bugzilla.suse.com/1162766">SUSE bug 1162766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609780" comment="nextcloud-15.0.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15621</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15621" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15621" ref_url="https://www.suse.com/security/cve/CVE-2019-15621" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html" source="SUSE-SU"/>
    <description>
    Improper permissions preservation in Nextcloud Server 16.0.1 causes sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15621/">CVE-2019-15621</cve>
	<bugzilla href="https://bugzilla.suse.com/1162784">SUSE bug 1162784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609780" comment="nextcloud-15.0.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15623</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15623" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15623" ref_url="https://www.suse.com/security/cve/CVE-2019-15623" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html" source="SUSE-SU"/>
    <description>
    Exposure of Private Information in Nextcloud Server 16.0.1 causes the server to send it's domain and user IDs to the Nextcloud Lookup Server without any further data when the Lookup server is disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15623/">CVE-2019-15623</cve>
	<bugzilla href="https://bugzilla.suse.com/1162775">SUSE bug 1162775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609780" comment="nextcloud-15.0.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15624</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15624" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15624" ref_url="https://www.suse.com/security/cve/CVE-2019-15624" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html" source="SUSE-SU"/>
    <description>
    Improper Input Validation in Nextcloud Server 15.0.7 allows group admins to create users with IDs of system folders.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15624/">CVE-2019-15624</cve>
	<bugzilla href="https://bugzilla.suse.com/1162776">SUSE bug 1162776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609780" comment="nextcloud-15.0.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1563</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" source="SUSE-SU"/>
    <description>
    In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603166" comment="libopenssl-1_0_0-devel-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231070" comment="libopenssl-1_0_0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603167" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231071" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602840" comment="libopenssl-1_1-devel-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602841" comment="libopenssl-1_1-devel-32bit-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603168" comment="libopenssl1_0_0-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603169" comment="libopenssl1_0_0-32bit-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603170" comment="libopenssl1_0_0-hmac-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603171" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603172" comment="libopenssl1_0_0-steam-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171502" comment="libopenssl1_0_0-steam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603173" comment="libopenssl1_0_0-steam-32bit-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171503" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602842" comment="libopenssl1_1-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602843" comment="libopenssl1_1-32bit-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602844" comment="libopenssl1_1-hmac-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602845" comment="libopenssl1_1-hmac-32bit-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603174" comment="openssl-1_0_0-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231076" comment="openssl-1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603175" comment="openssl-1_0_0-cavs-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231077" comment="openssl-1_0_0-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603176" comment="openssl-1_0_0-doc-1.0.2p-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231078" comment="openssl-1_0_0-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602846" comment="openssl-1_1-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602847" comment="openssl-1_1-doc-1.1.0i-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15666</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15681</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15681" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1164-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00073.html" source="SUSE-SU"/>
    <description>
    LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607859" comment="LibVNCServer-devel-0.9.10-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607860" comment="libvncclient0-0.9.10-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607861" comment="libvncserver0-0.9.10-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604401" comment="vino-3.22.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151564" comment="vino is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604402" comment="vino-lang-3.22.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151565" comment="vino-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15690</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1164-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607859" comment="LibVNCServer-devel-0.9.10-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607860" comment="libvncclient0-0.9.10-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607861" comment="libvncserver0-0.9.10-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15691</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691</cve>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609052" comment="libXvnc-devel-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154213" comment="libXvnc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609053" comment="libXvnc1-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154118" comment="libXvnc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609054" comment="tigervnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609055" comment="tigervnc-x11vnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276534" comment="tigervnc-x11vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609056" comment="xorg-x11-Xvnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609057" comment="xorg-x11-Xvnc-java-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276535" comment="xorg-x11-Xvnc-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609058" comment="xorg-x11-Xvnc-module-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276536" comment="xorg-x11-Xvnc-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609059" comment="xorg-x11-Xvnc-novnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276537" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15692</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow. Vulnerability could be triggered from CopyRectDecoder due to incorrect value checks. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692</cve>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609052" comment="libXvnc-devel-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154213" comment="libXvnc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609053" comment="libXvnc1-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154118" comment="libXvnc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609054" comment="tigervnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609055" comment="tigervnc-x11vnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276534" comment="tigervnc-x11vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609056" comment="xorg-x11-Xvnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609057" comment="xorg-x11-Xvnc-java-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276535" comment="xorg-x11-Xvnc-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609058" comment="xorg-x11-Xvnc-module-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276536" comment="xorg-x11-Xvnc-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609059" comment="xorg-x11-Xvnc-novnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276537" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15693</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693</cve>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609052" comment="libXvnc-devel-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154213" comment="libXvnc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609053" comment="libXvnc1-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154118" comment="libXvnc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609054" comment="tigervnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609055" comment="tigervnc-x11vnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276534" comment="tigervnc-x11vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609056" comment="xorg-x11-Xvnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609057" comment="xorg-x11-Xvnc-java-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276535" comment="xorg-x11-Xvnc-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609058" comment="xorg-x11-Xvnc-module-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276536" comment="xorg-x11-Xvnc-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609059" comment="xorg-x11-Xvnc-novnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276537" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15694</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694</cve>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609052" comment="libXvnc-devel-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154213" comment="libXvnc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609053" comment="libXvnc1-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154118" comment="libXvnc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609054" comment="tigervnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609055" comment="tigervnc-x11vnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276534" comment="tigervnc-x11vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609056" comment="xorg-x11-Xvnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609057" comment="xorg-x11-Xvnc-java-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276535" comment="xorg-x11-Xvnc-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609058" comment="xorg-x11-Xvnc-module-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276536" comment="xorg-x11-Xvnc-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609059" comment="xorg-x11-Xvnc-novnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276537" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695</cve>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609052" comment="libXvnc-devel-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154213" comment="libXvnc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609053" comment="libXvnc1-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154118" comment="libXvnc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609054" comment="tigervnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609055" comment="tigervnc-x11vnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276534" comment="tigervnc-x11vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609056" comment="xorg-x11-Xvnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609057" comment="xorg-x11-Xvnc-java-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276535" comment="xorg-x11-Xvnc-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609058" comment="xorg-x11-Xvnc-module-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276536" comment="xorg-x11-Xvnc-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609059" comment="xorg-x11-Xvnc-novnc-1.9.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276537" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15757</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15757" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15757" ref_url="https://www.suse.com/security/cve/CVE-2019-15757" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00037.html" source="SUSE-SU"/>
    <description>
    libMirage 3.2.2 in CDemu has a NULL pointer dereference in the NRG parser in parser.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15757/">CVE-2019-15757</cve>
	<bugzilla href="https://bugzilla.suse.com/1148728">SUSE bug 1148728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602664" comment="libmirage-3_2-3.2.2-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263214" comment="libmirage-3_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602665" comment="libmirage-data-3.2.2-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263215" comment="libmirage-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602666" comment="libmirage-devel-3.2.2-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263216" comment="libmirage-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602667" comment="libmirage-lang-3.2.2-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263217" comment="libmirage-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602668" comment="libmirage11-3.2.2-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263218" comment="libmirage11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602669" comment="typelib-1_0-libmirage-3_2-3.2.2-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263219" comment="typelib-1_0-libmirage-3_2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15784</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15784" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15784" ref_url="https://www.suse.com/security/cve/CVE-2019-15784" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00036.html" source="SUSE-SU"/>
    <description>
    Secure Reliable Transport (SRT) through 1.3.4 has a CSndUList array overflow if there are many SRT connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15784/">CVE-2019-15784</cve>
	<bugzilla href="https://bugzilla.suse.com/1148844">SUSE bug 1148844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602655" comment="libsrt1-1.3.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266873" comment="libsrt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602656" comment="srt-1.3.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266874" comment="srt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602657" comment="srt-devel-1.3.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266875" comment="srt-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15845</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845</cve>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607294" comment="libruby2_5-2_5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607295" comment="ruby2.5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607296" comment="ruby2.5-devel-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607297" comment="ruby2.5-devel-extra-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607298" comment="ruby2.5-doc-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607299" comment="ruby2.5-doc-ri-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607300" comment="ruby2.5-stdlib-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15846" ref_url="https://www.suse.com/security/cve/CVE-2019-15846" source="SUSE CVE"/>
		<reference ref_id="TID000019528" ref_url="https://www.suse.com/support/kb/doc/?id=000019528" source="SUSE-SU"/>
		<reference ref_id="TID7024110" ref_url="https://www.suse.com/support/kb/doc/?id=7024110" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
    <description>
    Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-15846/">CVE-2019-15846</cve>
	<bugzilla href="https://bugzilla.suse.com/1149182">SUSE bug 1149182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602661" comment="exim-4.88-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602662" comment="eximon-4.88-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602663" comment="eximstats-html-4.88-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15847</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15847" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603327" comment="cpp7-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268648" comment="cpp7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608126" comment="cpp9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283950" comment="cpp9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608127" comment="cross-nvptx-gcc9-9.3.1+git1296-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283951" comment="cross-nvptx-gcc9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608128" comment="cross-nvptx-newlib9-devel-9.3.1+git1296-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283952" comment="cross-nvptx-newlib9-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603328" comment="gcc7-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268649" comment="gcc7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603329" comment="gcc7-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268650" comment="gcc7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603330" comment="gcc7-ada-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268651" comment="gcc7-ada is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603331" comment="gcc7-ada-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268652" comment="gcc7-ada-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603332" comment="gcc7-c++-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268653" comment="gcc7-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603333" comment="gcc7-c++-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268654" comment="gcc7-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603334" comment="gcc7-fortran-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268655" comment="gcc7-fortran is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603335" comment="gcc7-fortran-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268656" comment="gcc7-fortran-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603336" comment="gcc7-go-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268657" comment="gcc7-go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603337" comment="gcc7-go-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268658" comment="gcc7-go-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603338" comment="gcc7-info-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268659" comment="gcc7-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603339" comment="gcc7-locale-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268660" comment="gcc7-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603340" comment="gcc7-obj-c++-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268661" comment="gcc7-obj-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603341" comment="gcc7-obj-c++-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268662" comment="gcc7-obj-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603342" comment="gcc7-objc-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268663" comment="gcc7-objc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603343" comment="gcc7-objc-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268664" comment="gcc7-objc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608129" comment="gcc9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283953" comment="gcc9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608130" comment="gcc9-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283954" comment="gcc9-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608131" comment="gcc9-ada-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283955" comment="gcc9-ada is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608132" comment="gcc9-ada-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283956" comment="gcc9-ada-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608133" comment="gcc9-c++-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283957" comment="gcc9-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608134" comment="gcc9-c++-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283958" comment="gcc9-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608135" comment="gcc9-fortran-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283959" comment="gcc9-fortran is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608136" comment="gcc9-fortran-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283960" comment="gcc9-fortran-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608137" comment="gcc9-go-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283961" comment="gcc9-go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608138" comment="gcc9-go-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283962" comment="gcc9-go-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608139" comment="gcc9-info-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283963" comment="gcc9-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608140" comment="gcc9-locale-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283964" comment="gcc9-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603344" comment="libada7-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268665" comment="libada7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603345" comment="libada7-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268666" comment="libada7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608141" comment="libada9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283965" comment="libada9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608142" comment="libada9-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283966" comment="libada9-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603346" comment="libasan4-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268667" comment="libasan4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603347" comment="libasan4-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268668" comment="libasan4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608143" comment="libasan5-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283967" comment="libasan5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608144" comment="libasan5-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283968" comment="libasan5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608145" comment="libatomic1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152915" comment="libatomic1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608146" comment="libatomic1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152916" comment="libatomic1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603348" comment="libcilkrts5-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152919" comment="libcilkrts5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603349" comment="libcilkrts5-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152920" comment="libcilkrts5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608147" comment="libgcc_s1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152931" comment="libgcc_s1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608148" comment="libgcc_s1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152932" comment="libgcc_s1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603350" comment="libgfortran4-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268669" comment="libgfortran4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603351" comment="libgfortran4-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268670" comment="libgfortran4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608149" comment="libgfortran5-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283969" comment="libgfortran5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608150" comment="libgfortran5-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283970" comment="libgfortran5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603352" comment="libgo11-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268671" comment="libgo11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603353" comment="libgo11-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268672" comment="libgo11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608151" comment="libgo14-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283971" comment="libgo14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608152" comment="libgo14-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283972" comment="libgo14-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608153" comment="libgomp1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152942" comment="libgomp1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608154" comment="libgomp1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152943" comment="libgomp1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608155" comment="libitm1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152946" comment="libitm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608156" comment="libitm1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152947" comment="libitm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608157" comment="liblsan0-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152950" comment="liblsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603354" comment="libobjc4-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152198" comment="libobjc4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603355" comment="libobjc4-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152955" comment="libobjc4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608158" comment="libquadmath0-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152956" comment="libquadmath0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608159" comment="libquadmath0-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152957" comment="libquadmath0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608160" comment="libstdc++6-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152962" comment="libstdc++6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608161" comment="libstdc++6-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152963" comment="libstdc++6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603356" comment="libstdc++6-devel-gcc7-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268673" comment="libstdc++6-devel-gcc7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603357" comment="libstdc++6-devel-gcc7-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268674" comment="libstdc++6-devel-gcc7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608162" comment="libstdc++6-devel-gcc9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283973" comment="libstdc++6-devel-gcc9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608163" comment="libstdc++6-devel-gcc9-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283974" comment="libstdc++6-devel-gcc9-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608164" comment="libstdc++6-locale-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152968" comment="libstdc++6-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608165" comment="libstdc++6-pp-gcc9-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283975" comment="libstdc++6-pp-gcc9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608166" comment="libstdc++6-pp-gcc9-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283976" comment="libstdc++6-pp-gcc9-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608167" comment="libtsan0-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152969" comment="libtsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603358" comment="libubsan0-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152971" comment="libubsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603359" comment="libubsan0-32bit-7.4.1+r275405-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152972" comment="libubsan0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608168" comment="libubsan1-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283977" comment="libubsan1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608169" comment="libubsan1-32bit-9.3.1+git1296-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283978" comment="libubsan1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15890</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603672" comment="qemu-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603673" comment="qemu-arm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603674" comment="qemu-audio-alsa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603675" comment="qemu-audio-oss-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603676" comment="qemu-audio-pa-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603677" comment="qemu-audio-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603678" comment="qemu-block-curl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603679" comment="qemu-block-dmg-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603680" comment="qemu-block-gluster-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603681" comment="qemu-block-iscsi-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603682" comment="qemu-block-nfs-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603683" comment="qemu-block-rbd-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603684" comment="qemu-block-ssh-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603685" comment="qemu-extra-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603686" comment="qemu-guest-agent-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603687" comment="qemu-ipxe-1.0.0+-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603688" comment="qemu-ksm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603689" comment="qemu-kvm-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603690" comment="qemu-lang-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603691" comment="qemu-linux-user-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603692" comment="qemu-ppc-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603693" comment="qemu-s390-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603694" comment="qemu-seabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603695" comment="qemu-sgabios-8-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603696" comment="qemu-tools-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603697" comment="qemu-ui-curses-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603698" comment="qemu-ui-gtk-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603699" comment="qemu-ui-sdl-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603700" comment="qemu-vgabios-1.12.0-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603701" comment="qemu-x86-3.1.1.1-lp151.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15892</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15892" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15892" ref_url="https://www.suse.com/security/cve/CVE-2019-15892" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00089.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15892/">CVE-2019-15892</cve>
	<bugzilla href="https://bugzilla.suse.com/1149382">SUSE bug 1149382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603015" comment="libvarnishapi2-6.2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265429" comment="libvarnishapi2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603016" comment="varnish-6.2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265431" comment="varnish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603017" comment="varnish-devel-6.2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265433" comment="varnish-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15902</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream "x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15903</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603605" comment="MozillaFirefox-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603606" comment="MozillaFirefox-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270406" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603607" comment="MozillaFirefox-branding-upstream-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603608" comment="MozillaFirefox-buildsymbols-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603609" comment="MozillaFirefox-devel-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603610" comment="MozillaFirefox-translations-common-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603611" comment="MozillaFirefox-translations-other-68.2.0-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603613" comment="MozillaThunderbird-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603614" comment="MozillaThunderbird-translations-common-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603615" comment="MozillaThunderbird-translations-other-68.2.1-lp151.2.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603392" comment="chromedriver-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603393" comment="chromium-78.0.3904.70-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603050" comment="expat-2.2.5-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603612" comment="firefox-esr-branding-openSUSE-68-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270407" comment="firefox-esr-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603051" comment="libexpat-devel-2.2.5-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603052" comment="libexpat-devel-32bit-2.2.5-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151785" comment="libexpat-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603053" comment="libexpat1-2.2.5-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603054" comment="libexpat1-32bit-2.2.5-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151333" comment="libexpat1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603394" comment="libre2-0-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603395" comment="libre2-0-32bit-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603396" comment="re2-devel-20190901-lp151.10.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15916</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916</cve>
	<bugzilla href="https://bugzilla.suse.com/1149448">SUSE bug 1149448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15917</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917</cve>
	<bugzilla href="https://bugzilla.suse.com/1149539">SUSE bug 1149539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156334">SUSE bug 1156334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15919</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15919" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15919" ref_url="https://www.suse.com/security/cve/CVE-2019-15919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15919/">CVE-2019-15919</cve>
	<bugzilla href="https://bugzilla.suse.com/1149552">SUSE bug 1149552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172957">SUSE bug 1172957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15920</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15920" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15920" ref_url="https://www.suse.com/security/cve/CVE-2019-15920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.10. SMB2_read in fs/cifs/smb2pdu.c has a use-after-free. NOTE: this was not fixed correctly in 5.0.10; see the 5.0.11 ChangeLog, which documents a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15920/">CVE-2019-15920</cve>
	<bugzilla href="https://bugzilla.suse.com/1149626">SUSE bug 1149626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156335">SUSE bug 1156335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15921</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15921" ref_url="https://www.suse.com/security/cve/CVE-2019-15921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15921/">CVE-2019-15921</cve>
	<bugzilla href="https://bugzilla.suse.com/1149602">SUSE bug 1149602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15924</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15926</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15926" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15927</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15927" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15939</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15939" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15939" ref_url="https://www.suse.com/security/cve/CVE-2019-15939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3192-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenCV 4.1.0. There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15939/">CVE-2019-15939</cve>
	<bugzilla href="https://bugzilla.suse.com/1149742">SUSE bug 1149742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603884" comment="libopencv3_3-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223580" comment="libopencv3_3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603885" comment="opencv-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175725" comment="opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603886" comment="opencv-devel-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175727" comment="opencv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603887" comment="opencv-doc-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175729" comment="opencv-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603888" comment="python2-opencv-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223581" comment="python2-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603889" comment="python3-opencv-3.3.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175741" comment="python3-opencv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15942</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15942" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15942" ref_url="https://www.suse.com/security/cve/CVE-2019-15942" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00012.html" source="SUSE-SU"/>
    <description>
    FFmpeg through 4.2 has a "Conditional jump or move depends on uninitialised value" issue in h2645_parse because alloc_rbsp_buffer in libavcodec/h2645_parse.c mishandles rbsp_buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15942/">CVE-2019-15942</cve>
	<bugzilla href="https://bugzilla.suse.com/1149839">SUSE bug 1149839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609618" comment="ffmpeg-4-libavcodec-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234594" comment="ffmpeg-4-libavcodec-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609619" comment="ffmpeg-4-libavdevice-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234595" comment="ffmpeg-4-libavdevice-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609620" comment="ffmpeg-4-libavfilter-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234596" comment="ffmpeg-4-libavfilter-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609621" comment="ffmpeg-4-libavformat-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234597" comment="ffmpeg-4-libavformat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609622" comment="ffmpeg-4-libavresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234598" comment="ffmpeg-4-libavresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609623" comment="ffmpeg-4-libavutil-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234599" comment="ffmpeg-4-libavutil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609624" comment="ffmpeg-4-libpostproc-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234600" comment="ffmpeg-4-libpostproc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609625" comment="ffmpeg-4-libswresample-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234601" comment="ffmpeg-4-libswresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609626" comment="ffmpeg-4-libswscale-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234602" comment="ffmpeg-4-libswscale-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609627" comment="ffmpeg-4-private-devel-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234603" comment="ffmpeg-4-private-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609628" comment="libavcodec58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234604" comment="libavcodec58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510674" comment="libavcodec58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234605" comment="libavcodec58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609629" comment="libavdevice58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234606" comment="libavdevice58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510677" comment="libavdevice58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234607" comment="libavdevice58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609630" comment="libavfilter7-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234608" comment="libavfilter7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510680" comment="libavfilter7-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234609" comment="libavfilter7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609631" comment="libavformat58-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234610" comment="libavformat58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510683" comment="libavformat58-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234611" comment="libavformat58-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609632" comment="libavresample4-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234612" comment="libavresample4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510686" comment="libavresample4-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234613" comment="libavresample4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609633" comment="libavutil56-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234614" comment="libavutil56 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510689" comment="libavutil56-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234615" comment="libavutil56-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609634" comment="libpostproc55-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234616" comment="libpostproc55 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510692" comment="libpostproc55-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234617" comment="libpostproc55-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609635" comment="libswresample3-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234618" comment="libswresample3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510695" comment="libswresample3-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234619" comment="libswresample3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609636" comment="libswscale5-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234620" comment="libswscale5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009510698" comment="libswscale5-32bit-4.2.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234621" comment="libswscale5-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15961</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15961" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180082">SUSE bug 1180082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603875" comment="libclamav7-0.100.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231590" comment="libclamav7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603876" comment="libclammspack0-0.100.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231591" comment="libclammspack0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16056</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603367" comment="libpython2_7-1_0-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603368" comment="libpython2_7-1_0-32bit-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609781" comment="libpython3_6m1_0-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609782" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603369" comment="python-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603370" comment="python-32bit-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603371" comment="python-base-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603372" comment="python-base-32bit-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603373" comment="python-curses-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603374" comment="python-demo-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603375" comment="python-devel-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603376" comment="python-doc-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603377" comment="python-doc-pdf-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603378" comment="python-gdbm-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603379" comment="python-idle-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603380" comment="python-tk-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603381" comment="python-xml-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609783" comment="python3-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609784" comment="python3-32bit-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609785" comment="python3-base-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609786" comment="python3-base-32bit-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609787" comment="python3-curses-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609788" comment="python3-dbm-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609789" comment="python3-devel-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609790" comment="python3-idle-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609791" comment="python3-testsuite-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609792" comment="python3-tk-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609793" comment="python3-tools-3.6.10-lp151.6.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16159</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16159" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16159" ref_url="https://www.suse.com/security/cve/CVE-2019-16159" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00065.html" source="SUSE-SU"/>
    <description>
    BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16159/">CVE-2019-16159</cve>
	<bugzilla href="https://bugzilla.suse.com/1150108">SUSE bug 1150108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602848" comment="bird-1.6.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266876" comment="bird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602849" comment="bird-common-1.6.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266877" comment="bird-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602850" comment="bird-doc-1.6.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266878" comment="bird-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602851" comment="bird6-1.6.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266879" comment="bird6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16167</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16167" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2752-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2397-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00068.html" source="SUSE-SU"/>
    <description>
    sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167</cve>
	<bugzilla href="https://bugzilla.suse.com/1150114">SUSE bug 1150114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603382" comment="sysstat-12.0.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247516" comment="sysstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603383" comment="sysstat-isag-12.0.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247517" comment="sysstat-isag is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16168</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html" source="SUSE-SU"/>
    <description>
    In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a "severe division by zero in the query planner."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168</cve>
	<bugzilla href="https://bugzilla.suse.com/1150137">SUSE bug 1150137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603263" comment="libsqlite3-0-3.28.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603264" comment="libsqlite3-0-32bit-3.28.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153746" comment="libsqlite3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603265" comment="sqlite3-3.28.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153747" comment="sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603266" comment="sqlite3-devel-3.28.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153748" comment="sqlite3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603267" comment="sqlite3-doc-3.28.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153749" comment="sqlite3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16201</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201</cve>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607294" comment="libruby2_5-2_5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607295" comment="ruby2.5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607296" comment="ruby2.5-devel-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607297" comment="ruby2.5-devel-extra-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607298" comment="ruby2.5-doc-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607299" comment="ruby2.5-doc-ri-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607300" comment="ruby2.5-stdlib-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16231</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603643" comment="kernel-debug-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603644" comment="kernel-debug-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603645" comment="kernel-debug-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603646" comment="kernel-default-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603647" comment="kernel-default-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603648" comment="kernel-default-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603649" comment="kernel-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603650" comment="kernel-docs-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603651" comment="kernel-docs-html-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603652" comment="kernel-kvmsmall-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603653" comment="kernel-kvmsmall-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603654" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603655" comment="kernel-macros-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603656" comment="kernel-obs-build-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603657" comment="kernel-obs-qa-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603658" comment="kernel-source-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603659" comment="kernel-source-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603660" comment="kernel-syms-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603661" comment="kernel-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603662" comment="kernel-vanilla-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603663" comment="kernel-vanilla-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16232</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603584" comment="kernel-debug-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603585" comment="kernel-debug-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603586" comment="kernel-debug-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603587" comment="kernel-default-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603588" comment="kernel-default-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603589" comment="kernel-default-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603590" comment="kernel-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603591" comment="kernel-docs-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603592" comment="kernel-docs-html-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603593" comment="kernel-kvmsmall-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603594" comment="kernel-kvmsmall-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603595" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603596" comment="kernel-macros-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603597" comment="kernel-obs-build-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603598" comment="kernel-obs-qa-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603599" comment="kernel-source-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603600" comment="kernel-source-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603601" comment="kernel-syms-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603602" comment="kernel-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603603" comment="kernel-vanilla-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603604" comment="kernel-vanilla-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16233</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
    <description>
    drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603584" comment="kernel-debug-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603585" comment="kernel-debug-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603586" comment="kernel-debug-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603587" comment="kernel-default-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603588" comment="kernel-default-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603589" comment="kernel-default-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603590" comment="kernel-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603591" comment="kernel-docs-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603592" comment="kernel-docs-html-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603593" comment="kernel-kvmsmall-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603594" comment="kernel-kvmsmall-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603595" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603596" comment="kernel-macros-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603597" comment="kernel-obs-build-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603598" comment="kernel-obs-qa-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603599" comment="kernel-source-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603600" comment="kernel-source-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603601" comment="kernel-syms-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603602" comment="kernel-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603603" comment="kernel-vanilla-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603604" comment="kernel-vanilla-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16234</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603584" comment="kernel-debug-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603585" comment="kernel-debug-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603586" comment="kernel-debug-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603587" comment="kernel-default-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603588" comment="kernel-default-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603589" comment="kernel-default-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603590" comment="kernel-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603591" comment="kernel-docs-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603592" comment="kernel-docs-html-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603593" comment="kernel-kvmsmall-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603594" comment="kernel-kvmsmall-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603595" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603596" comment="kernel-macros-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603597" comment="kernel-obs-build-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603598" comment="kernel-obs-qa-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603599" comment="kernel-source-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603600" comment="kernel-source-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603601" comment="kernel-syms-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603602" comment="kernel-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603603" comment="kernel-vanilla-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603604" comment="kernel-vanilla-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16239</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16239" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16239" ref_url="https://www.suse.com/security/cve/CVE-2019-16239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2744-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html" source="SUSE-SU"/>
    <description>
    process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16239/">CVE-2019-16239</cve>
	<bugzilla href="https://bugzilla.suse.com/1151178">SUSE bug 1151178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603363" comment="openconnect-7.08-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151736" comment="openconnect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603364" comment="openconnect-devel-7.08-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151737" comment="openconnect-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603365" comment="openconnect-doc-7.08-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268921" comment="openconnect-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603366" comment="openconnect-lang-7.08-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177178" comment="openconnect-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16254</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254</cve>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165402">SUSE bug 1165402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607294" comment="libruby2_5-2_5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607295" comment="ruby2.5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607296" comment="ruby2.5-devel-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607297" comment="ruby2.5-devel-extra-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607298" comment="ruby2.5-doc-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607299" comment="ruby2.5-doc-ri-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607300" comment="ruby2.5-stdlib-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16255</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255</cve>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607294" comment="libruby2_5-2_5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607295" comment="ruby2.5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607296" comment="ruby2.5-devel-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607297" comment="ruby2.5-devel-extra-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607298" comment="ruby2.5-doc-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607299" comment="ruby2.5-doc-ri-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607300" comment="ruby2.5-stdlib-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16275" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0545-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GHTARPJSUMITH7M3ESWRIZUIYW5UAM6/" source="SUSE-SU"/>
    <description>
    hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16276</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16276" ref_url="https://www.suse.com/security/cve/CVE-2019-16276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2522-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html" source="SUSE-SU"/>
    <description>
    Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16276/">CVE-2019-16276</cve>
	<bugzilla href="https://bugzilla.suse.com/1152082">SUSE bug 1152082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603721" comment="go1.12-1.12.12-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603722" comment="go1.12-doc-1.12.12-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603723" comment="go1.12-race-1.12.12-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16319</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16319" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16319" ref_url="https://www.suse.com/security/cve/CVE-2019-16319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16319/">CVE-2019-16319</cve>
	<bugzilla href="https://bugzilla.suse.com/1150690">SUSE bug 1150690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16328</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16328" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16328" ref_url="https://www.suse.com/security/cve/CVE-2019-16328" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0763-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00004.html" source="SUSE-SU"/>
    <description>
    In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16328/">CVE-2019-16328</cve>
	<bugzilla href="https://bugzilla.suse.com/1152987">SUSE bug 1152987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608048" comment="python2-rpyc-4.1.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283674" comment="python2-rpyc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608049" comment="python3-rpyc-4.1.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283675" comment="python3-rpyc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16375</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16375" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16375" ref_url="https://www.suse.com/security/cve/CVE-2019-16375" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-16375/">CVE-2019-16375</cve>
	<bugzilla href="https://bugzilla.suse.com/1153324">SUSE bug 1153324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156431">SUSE bug 1156431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16680</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16680" ref_url="https://www.suse.com/security/cve/CVE-2019-16680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00035.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16680/">CVE-2019-16680</cve>
	<bugzilla href="https://bugzilla.suse.com/1151585">SUSE bug 1151585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608834" comment="file-roller-3.26.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153800" comment="file-roller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608835" comment="file-roller-lang-3.26.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153801" comment="file-roller-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00052.html" source="SUSE-SU"/>
    <description>
    Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707</cve>
	<bugzilla href="https://bugzilla.suse.com/1151867">SUSE bug 1151867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605687" comment="hunspell-1.6.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153301" comment="hunspell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605688" comment="hunspell-devel-1.6.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153303" comment="hunspell-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605689" comment="hunspell-devel-32bit-1.6.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153304" comment="hunspell-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605690" comment="hunspell-tools-1.6.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153306" comment="hunspell-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605691" comment="libhunspell-1_6-0-1.6.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296727" comment="libhunspell-1_6-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605692" comment="libhunspell-1_6-0-32bit-1.6.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296728" comment="libhunspell-1_6-0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16708</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708</cve>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16709</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2317-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709</cve>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603303" comment="GraphicsMagick-1.3.29-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603304" comment="GraphicsMagick-devel-1.3.29-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603305" comment="libGraphicsMagick++-Q16-12-1.3.29-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603306" comment="libGraphicsMagick++-devel-1.3.29-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603307" comment="libGraphicsMagick-Q16-3-1.3.29-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603308" comment="libGraphicsMagick3-config-1.3.29-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603309" comment="libGraphicsMagickWand-Q16-2-1.3.29-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603310" comment="perl-GraphicsMagick-1.3.29-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16710</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in coders/dot.c, as demonstrated by AcquireMagickMemory in MagickCore/memory.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710</cve>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16711</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-40 has a memory leak in Huffman2DEncodeImage in coders/ps2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711</cve>
	<bugzilla href="https://bugzilla.suse.com/1151784">SUSE bug 1151784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16712</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712</cve>
	<bugzilla href="https://bugzilla.suse.com/1151785">SUSE bug 1151785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16713</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713</cve>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603705" comment="ImageMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603706" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603707" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603708" comment="ImageMagick-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603709" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603710" comment="ImageMagick-doc-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603711" comment="ImageMagick-extra-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603712" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603713" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603714" comment="libMagick++-devel-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603715" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603716" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603717" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603718" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603719" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603720" comment="perl-PerlMagick-7.0.7.34-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16723</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16723" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16723" ref_url="https://www.suse.com/security/cve/CVE-2019-16723" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16723/">CVE-2019-16723</cve>
	<bugzilla href="https://bugzilla.suse.com/1151788">SUSE bug 1151788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16746</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16770</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16770" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. This vulnerability is patched in Puma 4.3.1 and 3.12.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770</cve>
	<bugzilla href="https://bugzilla.suse.com/1158675">SUSE bug 1158675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188527">SUSE bug 1188527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16775</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16775" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16775" ref_url="https://www.suse.com/security/cve/CVE-2019-16775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0104-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200104-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html" source="SUSE-SU"/>
    <description>
    Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16775/">CVE-2019-16775</cve>
	<bugzilla href="https://bugzilla.suse.com/1159352">SUSE bug 1159352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607680" comment="nodejs8-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607681" comment="nodejs8-devel-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607682" comment="nodejs8-docs-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607683" comment="npm8-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16776</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16776" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16776" ref_url="https://www.suse.com/security/cve/CVE-2019-16776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0104-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200104-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html" source="SUSE-SU"/>
    <description>
    Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain access to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16776/">CVE-2019-16776</cve>
	<bugzilla href="https://bugzilla.suse.com/1159352">SUSE bug 1159352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607680" comment="nodejs8-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607681" comment="nodejs8-devel-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607682" comment="nodejs8-docs-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607683" comment="npm8-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16777</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16777" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16777" ref_url="https://www.suse.com/security/cve/CVE-2019-16777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0104-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200104-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html" source="SUSE-SU"/>
    <description>
    Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16777/">CVE-2019-16777</cve>
	<bugzilla href="https://bugzilla.suse.com/1159352">SUSE bug 1159352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607680" comment="nodejs8-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607681" comment="nodejs8-devel-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607682" comment="nodejs8-docs-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607683" comment="npm8-8.17.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16779</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16779" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16779" ref_url="https://www.suse.com/security/cve/CVE-2019-16779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html" source="SUSE-SU"/>
    <description>
    In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16779/">CVE-2019-16779</cve>
	<bugzilla href="https://bugzilla.suse.com/1159342">SUSE bug 1159342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607160" comment="ruby2.5-rubygem-excon-0.59.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275706" comment="ruby2.5-rubygem-excon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607161" comment="ruby2.5-rubygem-excon-doc-0.59.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275707" comment="ruby2.5-rubygem-excon-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607162" comment="ruby2.5-rubygem-excon-testsuite-0.59.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275708" comment="ruby2.5-rubygem-excon-testsuite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16782</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16782" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" source="SUSE-SU"/>
    <description>
    There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782</cve>
	<bugzilla href="https://bugzilla.suse.com/1159548">SUSE bug 1159548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183174">SUSE bug 1183174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606622" comment="ruby2.5-rubygem-rack-2.0.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278437" comment="ruby2.5-rubygem-rack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606623" comment="ruby2.5-rubygem-rack-doc-2.0.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278438" comment="ruby2.5-rubygem-rack-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606624" comment="ruby2.5-rubygem-rack-testsuite-2.0.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278439" comment="ruby2.5-rubygem-rack-testsuite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16785</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16785" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16785" ref_url="https://www.suse.com/security/cve/CVE-2019-16785" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if a front-end server does not parse header fields with an LF the same way as it does those with a CRLF it can lead to the front-end and the back-end server parsing the same HTTP message in two different ways. This can lead to a potential for HTTP request smuggling/splitting whereby Waitress may see two requests while the front-end server only sees a single HTTP message. This issue is fixed in Waitress 1.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16785/">CVE-2019-16785</cve>
	<bugzilla href="https://bugzilla.suse.com/1161088">SUSE bug 1161088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606154" comment="python2-waitress-1.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299158" comment="python2-waitress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606155" comment="python3-waitress-1.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299159" comment="python3-waitress is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16786</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16786" ref_url="https://www.suse.com/security/cve/CVE-2019-16786" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16786/">CVE-2019-16786</cve>
	<bugzilla href="https://bugzilla.suse.com/1161089">SUSE bug 1161089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606154" comment="python2-waitress-1.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299158" comment="python2-waitress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606155" comment="python3-waitress-1.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299159" comment="python3-waitress is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16789" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16789" ref_url="https://www.suse.com/security/cve/CVE-2019-16789" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16789/">CVE-2019-16789</cve>
	<bugzilla href="https://bugzilla.suse.com/1160790">SUSE bug 1160790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606154" comment="python2-waitress-1.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299158" comment="python2-waitress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606155" comment="python3-waitress-1.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299159" comment="python3-waitress is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16792</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16792" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16792" ref_url="https://www.suse.com/security/cve/CVE-2019-16792" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16792/">CVE-2019-16792</cve>
	<bugzilla href="https://bugzilla.suse.com/1161670">SUSE bug 1161670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606154" comment="python2-waitress-1.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299158" comment="python2-waitress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606155" comment="python3-waitress-1.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009299159" comment="python3-waitress is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16884</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16884" ref_url="https://www.suse.com/security/cve/CVE-2019-16884" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2786-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192786-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00010.html" source="SUSE-SU"/>
    <description>
    runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16884/">CVE-2019-16884</cve>
	<bugzilla href="https://bugzilla.suse.com/1152308">SUSE bug 1152308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607341" comment="containerd-1.2.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607342" comment="containerd-ctr-1.2.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607343" comment="docker-19.03.5_ce-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607344" comment="docker-bash-completion-19.03.5_ce-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607345" comment="docker-libnetwork-0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607346" comment="docker-runc-1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607347" comment="docker-test-19.03.5_ce-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607348" comment="docker-zsh-completion-19.03.5_ce-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607349" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603367" comment="libpython2_7-1_0-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603368" comment="libpython2_7-1_0-32bit-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606883" comment="libpython3_6m1_0-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606884" comment="libpython3_6m1_0-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603369" comment="python-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603370" comment="python-32bit-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603371" comment="python-base-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603372" comment="python-base-32bit-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603373" comment="python-curses-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603374" comment="python-demo-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603375" comment="python-devel-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603376" comment="python-doc-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603377" comment="python-doc-pdf-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603378" comment="python-gdbm-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603379" comment="python-idle-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603380" comment="python-tk-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603381" comment="python-xml-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606885" comment="python3-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606886" comment="python3-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606887" comment="python3-base-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606888" comment="python3-base-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606889" comment="python3-curses-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606890" comment="python3-dbm-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606891" comment="python3-devel-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606892" comment="python3-doc-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606893" comment="python3-doc-devhelp-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606894" comment="python3-idle-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606895" comment="python3-testsuite-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606896" comment="python3-tk-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606897" comment="python3-tools-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16994</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16994" ref_url="https://www.suse.com/security/cve/CVE-2019-16994" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-&gt;fb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16994/">CVE-2019-16994</cve>
	<bugzilla href="https://bugzilla.suse.com/1161523">SUSE bug 1161523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16995</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16995" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995</cve>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603584" comment="kernel-debug-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603585" comment="kernel-debug-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603586" comment="kernel-debug-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603587" comment="kernel-default-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603588" comment="kernel-default-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603589" comment="kernel-default-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603590" comment="kernel-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603591" comment="kernel-docs-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603592" comment="kernel-docs-html-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603593" comment="kernel-kvmsmall-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603594" comment="kernel-kvmsmall-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603595" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603596" comment="kernel-macros-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603597" comment="kernel-obs-build-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603598" comment="kernel-obs-qa-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603599" comment="kernel-source-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603600" comment="kernel-source-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603601" comment="kernel-syms-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603602" comment="kernel-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603603" comment="kernel-vanilla-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603604" comment="kernel-vanilla-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17005</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    The plain text serializer used a fixed-size array for the number of &lt;ol&gt; elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606217" comment="MozillaFirefox-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606218" comment="MozillaFirefox-branding-upstream-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606219" comment="MozillaFirefox-buildsymbols-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606220" comment="MozillaFirefox-devel-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606221" comment="MozillaFirefox-translations-common-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606222" comment="MozillaFirefox-translations-other-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607008" comment="MozillaThunderbird-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607009" comment="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607010" comment="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17006</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00047.html" source="SUSE-SU"/>
    <description>
    In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609017" comment="libfreebl3-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609018" comment="libfreebl3-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609019" comment="libfreebl3-hmac-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609020" comment="libfreebl3-hmac-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609021" comment="libsoftokn3-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609022" comment="libsoftokn3-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609023" comment="libsoftokn3-hmac-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609024" comment="libsoftokn3-hmac-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609025" comment="mozilla-nspr-4.25-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609026" comment="mozilla-nspr-32bit-4.25-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609027" comment="mozilla-nspr-devel-4.25-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609028" comment="mozilla-nss-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609029" comment="mozilla-nss-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609030" comment="mozilla-nss-certs-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609031" comment="mozilla-nss-certs-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609032" comment="mozilla-nss-devel-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609033" comment="mozilla-nss-sysinit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609034" comment="mozilla-nss-sysinit-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609035" comment="mozilla-nss-tools-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606217" comment="MozillaFirefox-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606218" comment="MozillaFirefox-branding-upstream-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606219" comment="MozillaFirefox-buildsymbols-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606220" comment="MozillaFirefox-devel-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606221" comment="MozillaFirefox-translations-common-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606222" comment="MozillaFirefox-translations-other-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607008" comment="MozillaThunderbird-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607009" comment="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607010" comment="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17009</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17009" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606217" comment="MozillaFirefox-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606218" comment="MozillaFirefox-branding-upstream-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606219" comment="MozillaFirefox-buildsymbols-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606220" comment="MozillaFirefox-devel-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606221" comment="MozillaFirefox-translations-common-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606222" comment="MozillaFirefox-translations-other-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607008" comment="MozillaThunderbird-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607009" comment="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607010" comment="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17010</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606217" comment="MozillaFirefox-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606218" comment="MozillaFirefox-branding-upstream-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606219" comment="MozillaFirefox-buildsymbols-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606220" comment="MozillaFirefox-devel-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606221" comment="MozillaFirefox-translations-common-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606222" comment="MozillaFirefox-translations-other-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607008" comment="MozillaThunderbird-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607009" comment="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607010" comment="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17011</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606217" comment="MozillaFirefox-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606218" comment="MozillaFirefox-branding-upstream-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606219" comment="MozillaFirefox-buildsymbols-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606220" comment="MozillaFirefox-devel-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606221" comment="MozillaFirefox-translations-common-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606222" comment="MozillaFirefox-translations-other-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607008" comment="MozillaThunderbird-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607009" comment="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607010" comment="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17012</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606217" comment="MozillaFirefox-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606218" comment="MozillaFirefox-branding-upstream-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606219" comment="MozillaFirefox-buildsymbols-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606220" comment="MozillaFirefox-devel-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606221" comment="MozillaFirefox-translations-common-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606222" comment="MozillaFirefox-translations-other-68.3.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607008" comment="MozillaThunderbird-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607009" comment="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607010" comment="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17015</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17015" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607718" comment="MozillaFirefox-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607719" comment="MozillaFirefox-branding-upstream-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607720" comment="MozillaFirefox-buildsymbols-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607721" comment="MozillaFirefox-devel-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607722" comment="MozillaFirefox-translations-common-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607723" comment="MozillaFirefox-translations-other-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609186" comment="MozillaThunderbird-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609187" comment="MozillaThunderbird-translations-common-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609188" comment="MozillaThunderbird-translations-other-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17016</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    When pasting a &amp;lt;style&amp;gt; tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607718" comment="MozillaFirefox-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607719" comment="MozillaFirefox-branding-upstream-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607720" comment="MozillaFirefox-buildsymbols-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607721" comment="MozillaFirefox-devel-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607722" comment="MozillaFirefox-translations-common-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607723" comment="MozillaFirefox-translations-other-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609186" comment="MozillaThunderbird-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609187" comment="MozillaThunderbird-translations-common-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609188" comment="MozillaThunderbird-translations-other-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17017</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607718" comment="MozillaFirefox-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607719" comment="MozillaFirefox-branding-upstream-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607720" comment="MozillaFirefox-buildsymbols-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607721" comment="MozillaFirefox-devel-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607722" comment="MozillaFirefox-translations-common-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607723" comment="MozillaFirefox-translations-other-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609186" comment="MozillaThunderbird-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609187" comment="MozillaThunderbird-translations-common-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609188" comment="MozillaThunderbird-translations-other-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17021</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17021" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607718" comment="MozillaFirefox-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607719" comment="MozillaFirefox-branding-upstream-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607720" comment="MozillaFirefox-buildsymbols-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607721" comment="MozillaFirefox-devel-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607722" comment="MozillaFirefox-translations-common-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607723" comment="MozillaFirefox-translations-other-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609186" comment="MozillaThunderbird-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609187" comment="MozillaThunderbird-translations-common-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609188" comment="MozillaThunderbird-translations-other-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17022</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    When pasting a &amp;lt;style&amp;gt; tag from the clipboard into a rich text editor, the CSS sanitizer does not escape &amp;lt; and &amp;gt; characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607718" comment="MozillaFirefox-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607719" comment="MozillaFirefox-branding-upstream-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607720" comment="MozillaFirefox-buildsymbols-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607721" comment="MozillaFirefox-devel-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607722" comment="MozillaFirefox-translations-common-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607723" comment="MozillaFirefox-translations-other-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609186" comment="MozillaThunderbird-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609187" comment="MozillaThunderbird-translations-common-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609188" comment="MozillaThunderbird-translations-other-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17024</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607718" comment="MozillaFirefox-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607719" comment="MozillaFirefox-branding-upstream-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607720" comment="MozillaFirefox-buildsymbols-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607721" comment="MozillaFirefox-devel-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607722" comment="MozillaFirefox-translations-common-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607723" comment="MozillaFirefox-translations-other-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609186" comment="MozillaThunderbird-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609187" comment="MozillaThunderbird-translations-common-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609188" comment="MozillaThunderbird-translations-other-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17026</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 68.4.1, Thunderbird &lt; 68.4.1, and Firefox &lt; 72.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607718" comment="MozillaFirefox-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607719" comment="MozillaFirefox-branding-upstream-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607720" comment="MozillaFirefox-buildsymbols-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607721" comment="MozillaFirefox-devel-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607722" comment="MozillaFirefox-translations-common-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607723" comment="MozillaFirefox-translations-other-68.4.1-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609186" comment="MozillaThunderbird-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609187" comment="MozillaThunderbird-translations-common-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609188" comment="MozillaThunderbird-translations-other-68.4.1-lp151.2.22.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17041</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17041" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041</cve>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198831">SUSE bug 1198831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603626" comment="rsyslog-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151645" comment="rsyslog is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603627" comment="rsyslog-diag-tools-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230484" comment="rsyslog-diag-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603628" comment="rsyslog-doc-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230485" comment="rsyslog-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603629" comment="rsyslog-module-dbi-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230486" comment="rsyslog-module-dbi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603630" comment="rsyslog-module-elasticsearch-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230487" comment="rsyslog-module-elasticsearch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603631" comment="rsyslog-module-gcrypt-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230488" comment="rsyslog-module-gcrypt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603632" comment="rsyslog-module-gssapi-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230489" comment="rsyslog-module-gssapi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603633" comment="rsyslog-module-gtls-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230490" comment="rsyslog-module-gtls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603634" comment="rsyslog-module-mmnormalize-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230491" comment="rsyslog-module-mmnormalize is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603635" comment="rsyslog-module-mysql-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230492" comment="rsyslog-module-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603636" comment="rsyslog-module-omamqp1-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230493" comment="rsyslog-module-omamqp1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603637" comment="rsyslog-module-omhttpfs-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230494" comment="rsyslog-module-omhttpfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603638" comment="rsyslog-module-omtcl-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230495" comment="rsyslog-module-omtcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603639" comment="rsyslog-module-pgsql-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230496" comment="rsyslog-module-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603640" comment="rsyslog-module-relp-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230497" comment="rsyslog-module-relp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603641" comment="rsyslog-module-snmp-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230498" comment="rsyslog-module-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603642" comment="rsyslog-module-udpspoof-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230499" comment="rsyslog-module-udpspoof is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17042</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17042" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042</cve>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198831">SUSE bug 1198831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603626" comment="rsyslog-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151645" comment="rsyslog is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603627" comment="rsyslog-diag-tools-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230484" comment="rsyslog-diag-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603628" comment="rsyslog-doc-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230485" comment="rsyslog-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603629" comment="rsyslog-module-dbi-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230486" comment="rsyslog-module-dbi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603630" comment="rsyslog-module-elasticsearch-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230487" comment="rsyslog-module-elasticsearch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603631" comment="rsyslog-module-gcrypt-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230488" comment="rsyslog-module-gcrypt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603632" comment="rsyslog-module-gssapi-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230489" comment="rsyslog-module-gssapi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603633" comment="rsyslog-module-gtls-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230490" comment="rsyslog-module-gtls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603634" comment="rsyslog-module-mmnormalize-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230491" comment="rsyslog-module-mmnormalize is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603635" comment="rsyslog-module-mysql-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230492" comment="rsyslog-module-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603636" comment="rsyslog-module-omamqp1-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230493" comment="rsyslog-module-omamqp1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603637" comment="rsyslog-module-omhttpfs-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230494" comment="rsyslog-module-omhttpfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603638" comment="rsyslog-module-omtcl-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230495" comment="rsyslog-module-omtcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603639" comment="rsyslog-module-pgsql-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230496" comment="rsyslog-module-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603640" comment="rsyslog-module-relp-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230497" comment="rsyslog-module-relp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603641" comment="rsyslog-module-snmp-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230498" comment="rsyslog-module-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603642" comment="rsyslog-module-udpspoof-8.33.1-lp151.6.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230499" comment="rsyslog-module-udpspoof is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17055</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603643" comment="kernel-debug-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603644" comment="kernel-debug-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603645" comment="kernel-debug-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603646" comment="kernel-default-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603647" comment="kernel-default-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603648" comment="kernel-default-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603649" comment="kernel-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603650" comment="kernel-docs-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603651" comment="kernel-docs-html-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603652" comment="kernel-kvmsmall-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603653" comment="kernel-kvmsmall-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603654" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603655" comment="kernel-macros-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603656" comment="kernel-obs-build-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603657" comment="kernel-obs-qa-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603658" comment="kernel-source-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603659" comment="kernel-source-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603660" comment="kernel-syms-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603661" comment="kernel-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603662" comment="kernel-vanilla-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603663" comment="kernel-vanilla-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17056</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603584" comment="kernel-debug-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603585" comment="kernel-debug-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603586" comment="kernel-debug-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603587" comment="kernel-default-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603588" comment="kernel-default-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603589" comment="kernel-default-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603590" comment="kernel-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603591" comment="kernel-docs-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603592" comment="kernel-docs-html-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603593" comment="kernel-kvmsmall-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603594" comment="kernel-kvmsmall-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603595" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603596" comment="kernel-macros-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603597" comment="kernel-obs-build-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603598" comment="kernel-obs-qa-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603599" comment="kernel-source-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603600" comment="kernel-source-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603601" comment="kernel-syms-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603602" comment="kernel-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603603" comment="kernel-vanilla-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603604" comment="kernel-vanilla-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17068" ref_url="https://www.suse.com/security/cve/CVE-2019-17068" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2276-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.html" source="SUSE-SU"/>
    <description>
    PuTTY before 0.73 mishandles the "bracketed paste mode" protection mechanism, which may allow a session to be affected by malicious clipboard content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17068/">CVE-2019-17068</cve>
	<bugzilla href="https://bugzilla.suse.com/1152753">SUSE bug 1152753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603233" comment="putty-0.73-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152979" comment="putty is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17069</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17069" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17069" ref_url="https://www.suse.com/security/cve/CVE-2019-17069" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2276-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00030.html" source="SUSE-SU"/>
    <description>
    PuTTY before 0.73 might allow remote SSH-1 servers to cause a denial of service by accessing freed memory locations via an SSH1_MSG_DISCONNECT message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17069/">CVE-2019-17069</cve>
	<bugzilla href="https://bugzilla.suse.com/1152753">SUSE bug 1152753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603233" comment="putty-0.73-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152979" comment="putty is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17113</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17113" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17113" ref_url="https://www.suse.com/security/cve/CVE-2019-17113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17113/">CVE-2019-17113</cve>
	<bugzilla href="https://bugzilla.suse.com/1153102">SUSE bug 1153102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603268" comment="libmodplug-devel-0.3.19-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230500" comment="libmodplug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603269" comment="libmodplug1-0.3.19-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151586" comment="libmodplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603270" comment="libmodplug1-32bit-0.3.19-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230501" comment="libmodplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603271" comment="libopenmpt-devel-0.3.19-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230503" comment="libopenmpt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603272" comment="libopenmpt0-0.3.19-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230504" comment="libopenmpt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603273" comment="libopenmpt0-32bit-0.3.19-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230505" comment="libopenmpt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603274" comment="libopenmpt_modplug1-0.3.19-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230506" comment="libopenmpt_modplug1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603275" comment="libopenmpt_modplug1-32bit-0.3.19-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230507" comment="libopenmpt_modplug1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603276" comment="openmpt123-0.3.19-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230508" comment="openmpt123 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17133</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2859-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603584" comment="kernel-debug-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603585" comment="kernel-debug-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603586" comment="kernel-debug-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603587" comment="kernel-default-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603588" comment="kernel-default-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603589" comment="kernel-default-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603590" comment="kernel-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603591" comment="kernel-docs-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603592" comment="kernel-docs-html-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603593" comment="kernel-kvmsmall-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603594" comment="kernel-kvmsmall-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603595" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603596" comment="kernel-macros-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603597" comment="kernel-obs-build-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603598" comment="kernel-obs-qa-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603599" comment="kernel-source-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603600" comment="kernel-source-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603601" comment="kernel-syms-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603602" comment="kernel-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603603" comment="kernel-vanilla-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603604" comment="kernel-vanilla-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17177</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17177" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17177" ref_url="https://www.suse.com/security/cve/CVE-2019-17177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" source="SUSE-SU"/>
    <description>
    libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17177/">CVE-2019-17177</cve>
	<bugzilla href="https://bugzilla.suse.com/1153163">SUSE bug 1153163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603834" comment="freerdp-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603835" comment="freerdp-devel-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603836" comment="freerdp-server-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603837" comment="freerdp-wayland-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603838" comment="libfreerdp2-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603839" comment="libuwac0-0-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603840" comment="libwinpr2-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603841" comment="uwac0-0-devel-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603842" comment="winpr2-devel-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17178</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17178" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17178" ref_url="https://www.suse.com/security/cve/CVE-2019-17178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" source="SUSE-SU"/>
    <description>
    HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17178/">CVE-2019-17178</cve>
	<bugzilla href="https://bugzilla.suse.com/1153164">SUSE bug 1153164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603834" comment="freerdp-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603835" comment="freerdp-devel-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603836" comment="freerdp-server-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603837" comment="freerdp-wayland-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603838" comment="libfreerdp2-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603839" comment="libuwac0-0-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603840" comment="libwinpr2-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603841" comment="uwac0-0-devel-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603842" comment="winpr2-devel-2.0.0~rc4-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17185</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17185" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007316.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html" source="SUSE-SU"/>
    <description>
    In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185</cve>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607602" comment="freeradius-server-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157108" comment="freeradius-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607603" comment="freeradius-server-devel-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157109" comment="freeradius-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607604" comment="freeradius-server-doc-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157110" comment="freeradius-server-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607605" comment="freeradius-server-krb5-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157111" comment="freeradius-server-krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607606" comment="freeradius-server-ldap-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157112" comment="freeradius-server-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607607" comment="freeradius-server-libs-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157113" comment="freeradius-server-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607608" comment="freeradius-server-mysql-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157114" comment="freeradius-server-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607609" comment="freeradius-server-perl-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157115" comment="freeradius-server-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607610" comment="freeradius-server-postgresql-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157116" comment="freeradius-server-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607611" comment="freeradius-server-python-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157117" comment="freeradius-server-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607612" comment="freeradius-server-sqlite-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157118" comment="freeradius-server-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607613" comment="freeradius-server-utils-3.0.16-lp151.4.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157119" comment="freeradius-server-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17349</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17349" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17349" ref_url="https://www.suse.com/security/cve/CVE-2019-17349" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17349/">CVE-2019-17349</cve>
	<bugzilla href="https://bugzilla.suse.com/1138294">SUSE bug 1138294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609646" comment="xen-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609647" comment="xen-devel-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609648" comment="xen-doc-html-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609649" comment="xen-libs-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609650" comment="xen-libs-32bit-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609651" comment="xen-tools-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609652" comment="xen-tools-domU-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17350</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17350" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17350" ref_url="https://www.suse.com/security/cve/CVE-2019-17350" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a compare-and-exchange operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17350/">CVE-2019-17350</cve>
	<bugzilla href="https://bugzilla.suse.com/1138294">SUSE bug 1138294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609646" comment="xen-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609647" comment="xen-devel-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609648" comment="xen-doc-html-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609649" comment="xen-libs-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609650" comment="xen-libs-32bit-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609651" comment="xen-tools-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609652" comment="xen-tools-domU-4.12.1_02-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17357</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17357" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17357" ref_url="https://www.suse.com/security/cve/CVE-2019-17357" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated remote attacker could exploit this via Cross-Site Request Forgery.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17357/">CVE-2019-17357</cve>
	<bugzilla href="https://bugzilla.suse.com/1158990">SUSE bug 1158990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17358</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17358" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17358" ref_url="https://www.suse.com/security/cve/CVE-2019-17358" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17358/">CVE-2019-17358</cve>
	<bugzilla href="https://bugzilla.suse.com/1158992">SUSE bug 1158992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17361</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17361" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17361" ref_url="https://www.suse.com/security/cve/CVE-2019-17361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html" source="SUSE-SU"/>
    <description>
    In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17361/">CVE-2019-17361</cve>
	<bugzilla href="https://bugzilla.suse.com/1162504">SUSE bug 1162504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607145" comment="python2-salt-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607146" comment="python3-salt-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607147" comment="salt-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607148" comment="salt-api-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607149" comment="salt-bash-completion-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607150" comment="salt-cloud-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607151" comment="salt-doc-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607152" comment="salt-fish-completion-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607153" comment="salt-master-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607154" comment="salt-minion-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607155" comment="salt-proxy-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607156" comment="salt-ssh-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607157" comment="salt-standalone-formulas-configuration-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607158" comment="salt-syndic-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607159" comment="salt-zsh-completion-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17362</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17362" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17362" ref_url="https://www.suse.com/security/cve/CVE-2019-17362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006200.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2454-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00041.html" source="SUSE-SU"/>
    <description>
    In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17362/">CVE-2019-17362</cve>
	<bugzilla href="https://bugzilla.suse.com/1153433">SUSE bug 1153433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603702" comment="libtomcrypt-devel-1.17-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270412" comment="libtomcrypt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603703" comment="libtomcrypt-examples-1.17-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270413" comment="libtomcrypt-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603704" comment="libtomcrypt0-1.17-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270414" comment="libtomcrypt0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17450</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450</cve>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605845" comment="binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605846" comment="binutils-devel-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605847" comment="binutils-devel-32bit-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605848" comment="binutils-gold-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605849" comment="cross-aarch64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605850" comment="cross-arm-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605851" comment="cross-avr-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605852" comment="cross-epiphany-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605853" comment="cross-hppa-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605854" comment="cross-hppa64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605855" comment="cross-i386-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605856" comment="cross-ia64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605857" comment="cross-m68k-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605858" comment="cross-mips-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605859" comment="cross-ppc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605860" comment="cross-ppc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605861" comment="cross-ppc64le-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605862" comment="cross-riscv64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605863" comment="cross-rx-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605864" comment="cross-s390-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605865" comment="cross-s390x-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605866" comment="cross-sparc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605867" comment="cross-sparc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605868" comment="cross-spu-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605869" comment="libctf-nobfd0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605870" comment="libctf0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17451</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451</cve>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605845" comment="binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605846" comment="binutils-devel-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605847" comment="binutils-devel-32bit-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605848" comment="binutils-gold-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605849" comment="cross-aarch64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605850" comment="cross-arm-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605851" comment="cross-avr-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605852" comment="cross-epiphany-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605853" comment="cross-hppa-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605854" comment="cross-hppa64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605855" comment="cross-i386-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605856" comment="cross-ia64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605857" comment="cross-m68k-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605858" comment="cross-mips-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605859" comment="cross-ppc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605860" comment="cross-ppc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605861" comment="cross-ppc64le-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605862" comment="cross-riscv64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605863" comment="cross-rx-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605864" comment="cross-s390-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605865" comment="cross-s390x-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605866" comment="cross-sparc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605867" comment="cross-sparc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605868" comment="cross-spu-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605869" comment="libctf-nobfd0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605870" comment="libctf0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17455</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17455" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17455" ref_url="https://www.suse.com/security/cve/CVE-2019-17455" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00029.html" source="SUSE-SU"/>
    <description>
    Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17455/">CVE-2019-17455</cve>
	<bugzilla href="https://bugzilla.suse.com/1153669">SUSE bug 1153669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608819" comment="libntlm-devel-1.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285686" comment="libntlm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608820" comment="libntlm0-1.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285687" comment="libntlm0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14226-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17543" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17543" ref_url="https://www.suse.com/security/cve/CVE-2019-17543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008776.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html" source="SUSE-SU"/>
    <description>
    LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17543/">CVE-2019-17543</cve>
	<bugzilla href="https://bugzilla.suse.com/1153936">SUSE bug 1153936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188549">SUSE bug 1188549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603388" comment="liblz4-1-1.8.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268961" comment="liblz4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603389" comment="liblz4-1-32bit-1.8.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268962" comment="liblz4-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603390" comment="liblz4-devel-1.8.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268963" comment="liblz4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603391" comment="lz4-1.8.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268964" comment="lz4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17545</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17545" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17545" ref_url="https://www.suse.com/security/cve/CVE-2019-17545" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2466-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00022.html" source="SUSE-SU"/>
    <description>
    GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17545/">CVE-2019-17545</cve>
	<bugzilla href="https://bugzilla.suse.com/1153918">SUSE bug 1153918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609794" comment="gdal-2.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270435" comment="gdal is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609795" comment="gdal-devel-2.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270436" comment="gdal-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609796" comment="libgdal20-2.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270437" comment="libgdal20 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609797" comment="perl-gdal-2.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270438" comment="perl-gdal is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609798" comment="python2-GDAL-2.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270439" comment="python2-GDAL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609799" comment="python3-GDAL-2.4.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270440" comment="python3-GDAL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17563</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0226-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html" source="SUSE-SU"/>
    <description>
    When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563</cve>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607241" comment="tomcat-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607242" comment="tomcat-admin-webapps-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607243" comment="tomcat-docs-webapp-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607244" comment="tomcat-el-3_0-api-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607245" comment="tomcat-embed-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607246" comment="tomcat-javadoc-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607247" comment="tomcat-jsp-2_3-api-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607248" comment="tomcat-jsvc-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607249" comment="tomcat-lib-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607250" comment="tomcat-servlet-4_0-api-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607251" comment="tomcat-webapps-9.0.30-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17566</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17566" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17566" ref_url="https://www.suse.com/security/cve/CVE-2019-17566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00062.html" source="SUSE-SU"/>
    <description>
    Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17566/">CVE-2019-17566</cve>
	<bugzilla href="https://bugzilla.suse.com/1172961">SUSE bug 1172961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609009" comment="xmlgraphics-batik-1.9-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286257" comment="xmlgraphics-batik is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609010" comment="xmlgraphics-batik-demo-1.9-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286258" comment="xmlgraphics-batik-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609011" comment="xmlgraphics-batik-rasterizer-1.9-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286259" comment="xmlgraphics-batik-rasterizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609012" comment="xmlgraphics-batik-slideshow-1.9-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286260" comment="xmlgraphics-batik-slideshow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609013" comment="xmlgraphics-batik-squiggle-1.9-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286261" comment="xmlgraphics-batik-squiggle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609014" comment="xmlgraphics-batik-svgpp-1.9-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286262" comment="xmlgraphics-batik-svgpp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609015" comment="xmlgraphics-batik-ttf2svg-1.9-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286263" comment="xmlgraphics-batik-ttf2svg is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17569</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17569" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569</cve>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607134" comment="tomcat-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607135" comment="tomcat-admin-webapps-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607136" comment="tomcat-docs-webapp-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607137" comment="tomcat-el-3_0-api-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607138" comment="tomcat-embed-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607139" comment="tomcat-javadoc-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607140" comment="tomcat-jsp-2_3-api-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607141" comment="tomcat-jsvc-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607142" comment="tomcat-lib-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607143" comment="tomcat-servlet-4_0-api-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607144" comment="tomcat-webapps-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17571</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17571" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0053-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200053-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0054-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200054-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html" source="SUSE-SU"/>
    <description>
    Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607513" comment="log4j-1.2.17-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275808" comment="log4j is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607514" comment="log4j-javadoc-1.2.17-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275809" comment="log4j-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607515" comment="log4j-manual-1.2.17-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275810" comment="log4j-manual is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607516" comment="log4j-mini-1.2.17-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275811" comment="log4j-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17594</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594</cve>
	<bugzilla href="https://bugzilla.suse.com/1154036">SUSE bug 1154036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603747" comment="libncurses5-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158856" comment="libncurses5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603748" comment="libncurses5-32bit-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158857" comment="libncurses5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603749" comment="libncurses6-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158858" comment="libncurses6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603750" comment="libncurses6-32bit-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158859" comment="libncurses6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603751" comment="ncurses-devel-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158861" comment="ncurses-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603752" comment="ncurses-devel-32bit-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158862" comment="ncurses-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603753" comment="ncurses-utils-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158863" comment="ncurses-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603754" comment="ncurses5-devel-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241509" comment="ncurses5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603755" comment="ncurses5-devel-32bit-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241510" comment="ncurses5-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603756" comment="tack-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158864" comment="tack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603757" comment="terminfo-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158865" comment="terminfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603758" comment="terminfo-base-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158866" comment="terminfo-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603759" comment="terminfo-iterm-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241511" comment="terminfo-iterm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603760" comment="terminfo-screen-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241512" comment="terminfo-screen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17595</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595</cve>
	<bugzilla href="https://bugzilla.suse.com/1154037">SUSE bug 1154037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603747" comment="libncurses5-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158856" comment="libncurses5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603748" comment="libncurses5-32bit-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158857" comment="libncurses5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603749" comment="libncurses6-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158858" comment="libncurses6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603750" comment="libncurses6-32bit-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158859" comment="libncurses6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603751" comment="ncurses-devel-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158861" comment="ncurses-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603752" comment="ncurses-devel-32bit-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158862" comment="ncurses-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603753" comment="ncurses-utils-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158863" comment="ncurses-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603754" comment="ncurses5-devel-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241509" comment="ncurses5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603755" comment="ncurses5-devel-32bit-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241510" comment="ncurses5-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603756" comment="tack-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158864" comment="tack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603757" comment="terminfo-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158865" comment="terminfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603758" comment="terminfo-base-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158866" comment="terminfo-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603759" comment="terminfo-iterm-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241511" comment="terminfo-iterm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603760" comment="terminfo-screen-6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241512" comment="terminfo-screen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17596</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17596" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17596" ref_url="https://www.suse.com/security/cve/CVE-2019-17596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2522-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html" source="SUSE-SU"/>
    <description>
    Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17596/">CVE-2019-17596</cve>
	<bugzilla href="https://bugzilla.suse.com/1154402">SUSE bug 1154402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603721" comment="go1.12-1.12.12-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603722" comment="go1.12-doc-1.12.12-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603723" comment="go1.12-race-1.12.12-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17626</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17626" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17626" ref_url="https://www.suse.com/security/cve/CVE-2019-17626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00002.html" source="SUSE-SU"/>
    <description>
    ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '&lt;span color="' followed by arbitrary Python code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-17626/">CVE-2019-17626</cve>
	<bugzilla href="https://bugzilla.suse.com/1154370">SUSE bug 1154370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605493" comment="python2-reportlab-3.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277408" comment="python2-reportlab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605494" comment="python3-reportlab-3.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277409" comment="python3-reportlab is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17666</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603584" comment="kernel-debug-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603585" comment="kernel-debug-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603586" comment="kernel-debug-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603587" comment="kernel-default-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603588" comment="kernel-default-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603589" comment="kernel-default-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603590" comment="kernel-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603591" comment="kernel-docs-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603592" comment="kernel-docs-html-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603593" comment="kernel-kvmsmall-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603594" comment="kernel-kvmsmall-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603595" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603596" comment="kernel-macros-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603597" comment="kernel-obs-build-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603598" comment="kernel-obs-qa-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603599" comment="kernel-source-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603600" comment="kernel-source-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603601" comment="kernel-syms-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603602" comment="kernel-vanilla-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603603" comment="kernel-vanilla-base-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603604" comment="kernel-vanilla-devel-4.12.14-lp151.28.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1785</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1785" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1785" ref_url="https://www.suse.com/security/cve/CVE-2019-1785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1785/">CVE-2019-1785</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137508">SUSE bug 1137508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1786</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1786" ref_url="https://www.suse.com/security/cve/CVE-2019-1786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1786/">CVE-2019-1786</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137510">SUSE bug 1137510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1787</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1787" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1788</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Object Linking &amp; Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1798</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1798" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1798" ref_url="https://www.suse.com/security/cve/CVE-2019-1798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1798/">CVE-2019-1798</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137513">SUSE bug 1137513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18179</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18179" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18179" ref_url="https://www.suse.com/security/cve/CVE-2019-18179" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.12, and Community Edition 5.0.x through 5.0.38 and 6.0.x through 6.0.23. An attacker who is logged into OTRS as an agent is able to list tickets assigned to other agents, even tickets in a queue where the attacker doesn't have permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18179/">CVE-2019-18179</cve>
	<bugzilla href="https://bugzilla.suse.com/1157001">SUSE bug 1157001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157523">SUSE bug 1157523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18180</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18180" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18180" ref_url="https://www.suse.com/security/cve/CVE-2019-18180" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    Improper Check for filenames with overly long extensions in PostMaster (sending in email) or uploading files (e.g. attaching files to mails) of ((OTRS)) Community Edition and OTRS allows an remote attacker to cause an endless loop. This issue affects: OTRS AG: ((OTRS)) Community Edition 5.0.x version 5.0.38 and prior versions; 6.0.x version 6.0.23 and prior versions. OTRS AG: OTRS 7.0.x version 7.0.12 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18180/">CVE-2019-18180</cve>
	<bugzilla href="https://bugzilla.suse.com/1157001">SUSE bug 1157001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157524">SUSE bug 1157524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18197</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html" source="SUSE-SU"/>
    <description>
    In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190108">SUSE bug 1190108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608185" comment="libxslt-devel-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608186" comment="libxslt-devel-32bit-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155745" comment="libxslt-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608187" comment="libxslt-python-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155746" comment="libxslt-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608188" comment="libxslt-tools-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608189" comment="libxslt1-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608190" comment="libxslt1-32bit-1.1.32-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155749" comment="libxslt1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18217</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18217" ref_url="https://www.suse.com/security/cve/CVE-2019-18217" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html" source="SUSE-SU"/>
    <description>
    ProFTPD before 1.3.6b and 1.3.7rc before 1.3.7rc2 allows remote unauthenticated denial-of-service due to incorrect handling of overly long commands because main.c in a child process enters an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18217/">CVE-2019-18217</cve>
	<bugzilla href="https://bugzilla.suse.com/1154600">SUSE bug 1154600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609637" comment="proftpd-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153640" comment="proftpd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609638" comment="proftpd-devel-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153641" comment="proftpd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609639" comment="proftpd-doc-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153642" comment="proftpd-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609640" comment="proftpd-lang-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153643" comment="proftpd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609641" comment="proftpd-ldap-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153644" comment="proftpd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609642" comment="proftpd-mysql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153645" comment="proftpd-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609643" comment="proftpd-pgsql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153646" comment="proftpd-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609644" comment="proftpd-radius-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153647" comment="proftpd-radius is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609645" comment="proftpd-sqlite-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153648" comment="proftpd-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18218</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html" source="SUSE-SU"/>
    <description>
    cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218</cve>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190368">SUSE bug 1190368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191838">SUSE bug 1191838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607977" comment="file-5.32-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151700" comment="file is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607978" comment="file-devel-5.32-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151701" comment="file-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607979" comment="file-devel-32bit-5.32-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009246003" comment="file-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607980" comment="file-magic-5.32-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151702" comment="file-magic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607981" comment="libmagic1-5.32-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151703" comment="libmagic1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607982" comment="libmagic1-32bit-5.32-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151704" comment="libmagic1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607983" comment="python2-magic-5.32-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009246004" comment="python2-magic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607984" comment="python3-magic-5.32-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009246005" comment="python3-magic is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18224</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18224" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18224" ref_url="https://www.suse.com/security/cve/CVE-2019-18224" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html" source="SUSE-SU"/>
    <description>
    idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18224/">CVE-2019-18224</cve>
	<bugzilla href="https://bugzilla.suse.com/1154887">SUSE bug 1154887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603843" comment="libidn2-0-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177212" comment="libidn2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603844" comment="libidn2-0-32bit-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177213" comment="libidn2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603845" comment="libidn2-devel-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273025" comment="libidn2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603846" comment="libidn2-lang-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273026" comment="libidn2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603847" comment="libidn2-tools-2.2.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273027" comment="libidn2-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18277</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18277" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18277" ref_url="https://www.suse.com/security/cve/CVE-2019-18277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2626-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00019.html" source="SUSE-SU"/>
    <description>
    A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18277/">CVE-2019-18277</cve>
	<bugzilla href="https://bugzilla.suse.com/1154980">SUSE bug 1154980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603867" comment="haproxy-2.0.10+git0.ac198b92-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18348</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608062" comment="libpython2_7-1_0-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608063" comment="libpython2_7-1_0-32bit-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606883" comment="libpython3_6m1_0-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606884" comment="libpython3_6m1_0-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608064" comment="python-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608065" comment="python-32bit-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608066" comment="python-base-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608067" comment="python-base-32bit-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608068" comment="python-curses-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608069" comment="python-demo-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608070" comment="python-devel-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608071" comment="python-doc-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608072" comment="python-doc-pdf-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608073" comment="python-gdbm-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608074" comment="python-idle-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608075" comment="python-tk-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608076" comment="python-xml-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606885" comment="python3-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606886" comment="python3-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606887" comment="python3-base-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606888" comment="python3-base-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606889" comment="python3-curses-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606890" comment="python3-dbm-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606891" comment="python3-devel-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606892" comment="python3-doc-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606893" comment="python3-doc-devhelp-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606894" comment="python3-idle-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606895" comment="python3-testsuite-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606896" comment="python3-tk-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606897" comment="python3-tools-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18359</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18359" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18359" ref_url="https://www.suse.com/security/cve/CVE-2019-18359" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0522-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00030.html" source="SUSE-SU"/>
    <description>
    A buffer over-read was discovered in ReadMP3APETag in apetag.c in MP3Gain 1.6.2. The vulnerability causes an application crash, which leads to remote denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18359/">CVE-2019-18359</cve>
	<bugzilla href="https://bugzilla.suse.com/1154971">SUSE bug 1154971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607530" comment="mp3gain-1.6.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281553" comment="mp3gain is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18388</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18388" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607667" comment="libvirglrenderer0-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154205" comment="libvirglrenderer0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607668" comment="virglrenderer-devel-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154207" comment="virglrenderer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607669" comment="virglrenderer-test-server-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154208" comment="virglrenderer-test-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18389</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18389" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607667" comment="libvirglrenderer0-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154205" comment="libvirglrenderer0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607668" comment="virglrenderer-devel-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154207" comment="virglrenderer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607669" comment="virglrenderer-test-server-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154208" comment="virglrenderer-test-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18390</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18390" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607667" comment="libvirglrenderer0-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154205" comment="libvirglrenderer0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607668" comment="virglrenderer-devel-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154207" comment="virglrenderer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607669" comment="virglrenderer-test-server-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154208" comment="virglrenderer-test-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18391</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18391" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607667" comment="libvirglrenderer0-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154205" comment="libvirglrenderer0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607668" comment="virglrenderer-devel-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154207" comment="virglrenderer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607669" comment="virglrenderer-test-server-0.6.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154208" comment="virglrenderer-test-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18408</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18408" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408</cve>
	<bugzilla href="https://bugzilla.suse.com/1155079">SUSE bug 1155079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603860" comment="bsdtar-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151800" comment="bsdtar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603861" comment="libarchive-devel-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151801" comment="libarchive-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603862" comment="libarchive13-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603863" comment="libarchive13-32bit-3.3.2-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152672" comment="libarchive13-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18420</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18420" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420</cve>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603664" comment="xen-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603665" comment="xen-devel-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603666" comment="xen-doc-html-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603667" comment="xen-libs-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603668" comment="xen-libs-32bit-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603669" comment="xen-tools-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603670" comment="xen-tools-domU-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18421</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18421" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be "promoted" before being used as a pagetable, and "demoted" before being used for any other type. Xen also allows for "recursive" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603664" comment="xen-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603665" comment="xen-devel-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603666" comment="xen-doc-html-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603667" comment="xen-libs-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603668" comment="xen-libs-32bit-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603669" comment="xen-tools-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603670" comment="xen-tools-domU-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18422</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18422" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18422" ref_url="https://www.suse.com/security/cve/CVE-2019-18422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service or gain privileges by leveraging the erroneous enabling of interrupts. Interrupts are unconditionally unmasked in exception handlers. When an exception occurs on an ARM system which is handled without changing processor level, some interrupts are unconditionally enabled during exception entry. So exceptions which occur when interrupts are masked will effectively unmask the interrupts. A malicious guest might contrive to arrange for critical Xen code to run with interrupts erroneously enabled. This could lead to data corruption, denial of service, or possibly even privilege escalation. However a precise attack technique has not been identified.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-18422/">CVE-2019-18422</cve>
	<bugzilla href="https://bugzilla.suse.com/1154464">SUSE bug 1154464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603664" comment="xen-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603665" comment="xen-devel-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603666" comment="xen-doc-html-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603667" comment="xen-libs-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603668" comment="xen-libs-32bit-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603669" comment="xen-tools-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603670" comment="xen-tools-domU-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18423</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18423" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18423" ref_url="https://www.suse.com/security/cve/CVE-2019-18423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service via a XENMEM_add_to_physmap hypercall. p2m-&gt;max_mapped_gfn is used by the functions p2m_resolve_translation_fault() and p2m_get_entry() to sanity check guest physical frame. The rest of the code in the two functions will assume that there is a valid root table and check that with BUG_ON(). The function p2m_get_root_pointer() will ignore the unused top bits of a guest physical frame. This means that the function p2m_set_entry() will alias the frame. However, p2m-&gt;max_mapped_gfn will be updated using the original frame. It would be possible to set p2m-&gt;max_mapped_gfn high enough to cover a frame that would lead p2m_get_root_pointer() to return NULL in p2m_get_entry() and p2m_resolve_translation_fault(). Additionally, the sanity check on p2m-&gt;max_mapped_gfn is off-by-one allowing "highest mapped + 1" to be considered valid. However, p2m_get_root_pointer() will return NULL. The problem could be triggered with a specially crafted hypercall XENMEM_add_to_physmap{, _batch} followed by an access to an address (via hypercall or direct access) that passes the sanity check but cause p2m_get_root_pointer() to return NULL. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen version 4.8 and newer are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-18423/">CVE-2019-18423</cve>
	<bugzilla href="https://bugzilla.suse.com/1154460">SUSE bug 1154460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603664" comment="xen-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603665" comment="xen-devel-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603666" comment="xen-doc-html-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603667" comment="xen-libs-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603668" comment="xen-libs-32bit-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603669" comment="xen-tools-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603670" comment="xen-tools-domU-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18424</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18424" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603664" comment="xen-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603665" comment="xen-devel-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603666" comment="xen-doc-html-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603667" comment="xen-libs-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603668" comment="xen-libs-32bit-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603669" comment="xen-tools-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603670" comment="xen-tools-domU-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18425</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18425" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don't install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603664" comment="xen-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603665" comment="xen-devel-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603666" comment="xen-doc-html-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603667" comment="xen-libs-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603668" comment="xen-libs-32bit-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603669" comment="xen-tools-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603670" comment="xen-tools-domU-4.12.1_04-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18466</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18466" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18466" ref_url="https://www.suse.com/security/cve/CVE-2019-18466" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00040.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18466/">CVE-2019-18466</cve>
	<bugzilla href="https://bugzilla.suse.com/1155217">SUSE bug 1155217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607301" comment="cni-0.7.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280793" comment="cni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607302" comment="cni-plugins-0.8.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280794" comment="cni-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607303" comment="conmon-2.0.10-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280795" comment="conmon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607304" comment="fuse-overlayfs-0.7.6-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266785" comment="fuse-overlayfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607305" comment="podman-1.8.0-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607306" comment="podman-cni-config-1.8.0-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18622" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18622" ref_url="https://www.suse.com/security/cve/CVE-2019-18622" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18622/">CVE-2019-18622</cve>
	<bugzilla href="https://bugzilla.suse.com/1157614">SUSE bug 1157614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158801">SUSE bug 1158801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609754" comment="phpMyAdmin-4.9.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18634</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006492.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0244-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-02/msg00091.html" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606936" comment="sudo-1.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606937" comment="sudo-devel-1.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606938" comment="sudo-test-1.8.22-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18660</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18676" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165586">SUSE bug 1165586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18677</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18677" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 3.x and 4.x through 4.8 when the append_domain setting is used (because the appended characters do not properly interact with hostname length restrictions). Due to incorrect message processing, it can inappropriately redirect traffic to origins it should not be delivered to.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18678" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18679</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18679" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18683</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173868">SUSE bug 1173868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18802" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18802" ref_url="https://www.suse.com/security/cve/CVE-2019-18802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006902.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0341-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIUODYDMMPC4VZZIR4DRKRPVXGPEDZRO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18802/">CVE-2019-18802</cve>
	<bugzilla href="https://bugzilla.suse.com/1159003">SUSE bug 1159003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607233" comment="libnghttp2-14-1.40.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607234" comment="libnghttp2-14-32bit-1.40.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177223" comment="libnghttp2-14-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607235" comment="libnghttp2-devel-1.40.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153584" comment="libnghttp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607236" comment="libnghttp2_asio-devel-1.40.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153585" comment="libnghttp2_asio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607237" comment="libnghttp2_asio1-1.40.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153586" comment="libnghttp2_asio1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607238" comment="libnghttp2_asio1-32bit-1.40.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267106" comment="libnghttp2_asio1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607239" comment="nghttp2-1.40.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153587" comment="nghttp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607240" comment="python3-nghttp2-1.40.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267108" comment="python3-nghttp2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18804</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2576-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html" source="SUSE-SU"/>
    <description>
    DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804</cve>
	<bugzilla href="https://bugzilla.suse.com/1156188">SUSE bug 1156188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603786" comment="djvulibre-3.5.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266976" comment="djvulibre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603787" comment="djvulibre-doc-3.5.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266977" comment="djvulibre-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603788" comment="libdjvulibre-devel-3.5.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266978" comment="libdjvulibre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603789" comment="libdjvulibre21-3.5.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266979" comment="libdjvulibre21 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18805</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603643" comment="kernel-debug-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603644" comment="kernel-debug-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603645" comment="kernel-debug-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603646" comment="kernel-default-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603647" comment="kernel-default-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603648" comment="kernel-default-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603649" comment="kernel-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603650" comment="kernel-docs-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603651" comment="kernel-docs-html-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603652" comment="kernel-kvmsmall-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603653" comment="kernel-kvmsmall-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603654" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603655" comment="kernel-macros-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603656" comment="kernel-obs-build-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603657" comment="kernel-obs-qa-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603658" comment="kernel-source-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603659" comment="kernel-source-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603660" comment="kernel-syms-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603661" comment="kernel-vanilla-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603662" comment="kernel-vanilla-base-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603663" comment="kernel-vanilla-devel-4.12.14-lp151.28.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18808</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<bugzilla href="https://bugzilla.suse.com/1156259">SUSE bug 1156259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18809</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18809" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<bugzilla href="https://bugzilla.suse.com/1156258">SUSE bug 1156258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18860</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18860" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Squid before 4.9, when certain web browsers are used, mishandles HTML in the host (aka hostname) parameter to cachemgr.cgi.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607858" comment="squid-4.11-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18897</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18897" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18897" ref_url="https://www.suse.com/security/cve/CVE-2019-18897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Factory allows local attackers to escalate privileges from user salt to root. This issue affects: SUSE Linux Enterprise Server 12 salt-master version 2019.2.0-46.83.1 and prior versions. SUSE Linux Enterprise Server 15 salt-master version 2019.2.0-6.21.1 and prior versions. openSUSE Factory salt-master version 2019.2.2-3.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18897/">CVE-2019-18897</cve>
	<bugzilla href="https://bugzilla.suse.com/1157465">SUSE bug 1157465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607145" comment="python2-salt-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607146" comment="python3-salt-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607147" comment="salt-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607148" comment="salt-api-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607149" comment="salt-bash-completion-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607150" comment="salt-cloud-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607151" comment="salt-doc-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607152" comment="salt-fish-completion-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607153" comment="salt-master-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607154" comment="salt-minion-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607155" comment="salt-proxy-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607156" comment="salt-ssh-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607157" comment="salt-standalone-formulas-configuration-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607158" comment="salt-syndic-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607159" comment="salt-zsh-completion-2019.2.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18898</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18898" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18898" ref_url="https://www.suse.com/security/cve/CVE-2019-18898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00066.html" source="SUSE-SU"/>
    <description>
    UNIX Symbolic Link (Symlink) Following vulnerability in the trousers package of SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allowed local attackers escalate privileges from user tss to root. This issue affects: SUSE Linux Enterprise Server 15 SP1 trousers versions prior to 0.3.14-6.3.1. openSUSE Factory trousers versions prior to 0.3.14-7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18898/">CVE-2019-18898</cve>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157651">SUSE bug 1157651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608209" comment="libtspi1-0.3.14-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275710" comment="libtspi1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608210" comment="libtspi1-32bit-0.3.14-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275711" comment="libtspi1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608211" comment="trousers-0.3.14-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275712" comment="trousers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608212" comment="trousers-devel-0.3.14-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275713" comment="trousers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18899</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18899" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18899" ref_url="https://www.suse.com/security/cve/CVE-2019-18899" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html" source="SUSE-SU"/>
    <description>
    The apt-cacher-ng package of openSUSE Leap 15.1 runs operations in user owned directory /run/apt-cacher-ng with root privileges. This can allow local attackers to influence the outcome of these operations. This issue affects: openSUSE Leap 15.1 apt-cacher-ng versions prior to 3.1-lp151.3.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18899/">CVE-2019-18899</cve>
	<bugzilla href="https://bugzilla.suse.com/1157703">SUSE bug 1157703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604918" comment="apt-cacher-ng-3.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277153" comment="apt-cacher-ng is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18900</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html" source="SUSE-SU"/>
    <description>
    : Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606943" comment="libsolv-demo-0.7.10-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234725" comment="libsolv-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606944" comment="libsolv-devel-0.7.10-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234726" comment="libsolv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606945" comment="libsolv-tools-0.7.10-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234727" comment="libsolv-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606946" comment="libzypp-17.19.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161722" comment="libzypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606947" comment="libzypp-devel-17.19.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161723" comment="libzypp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606948" comment="libzypp-devel-doc-17.19.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161724" comment="libzypp-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606949" comment="perl-solv-0.7.10-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234728" comment="perl-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606950" comment="python-solv-0.7.10-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234729" comment="python-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606951" comment="python3-solv-0.7.10-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234730" comment="python3-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606952" comment="ruby-solv-0.7.10-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234731" comment="ruby-solv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606953" comment="zypper-1.14.33-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251910" comment="zypper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606954" comment="zypper-aptitude-1.14.33-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251911" comment="zypper-aptitude is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606955" comment="zypper-log-1.14.33-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251912" comment="zypper-log is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606956" comment="zypper-needs-restarting-1.14.33-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262480" comment="zypper-needs-restarting is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18901</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in the mysql-systemd-helper of the mariadb packaging of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows local attackers to change the permissions of arbitrary files to 0640. This issue affects: SUSE Linux Enterprise Server 12 mariadb versions prior to 10.2.31-3.25.1. SUSE Linux Enterprise Server 15 mariadb versions prior to 10.2.31-3.26.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901</cve>
	<bugzilla href="https://bugzilla.suse.com/1160285">SUSE bug 1160285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606995" comment="libmysqld-devel-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606996" comment="libmysqld19-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606997" comment="mariadb-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606998" comment="mariadb-bench-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606999" comment="mariadb-client-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607000" comment="mariadb-errormessages-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607001" comment="mariadb-galera-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607002" comment="mariadb-test-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607003" comment="mariadb-tools-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18902</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18902" ref_url="https://www.suse.com/security/cve/CVE-2019-18902" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00005.html" source="SUSE-SU"/>
    <description>
    A Use After Free vulnerability in wicked of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Leap 15.1, Factory allows remote attackers to cause DoS or potentially code execution. This issue affects: SUSE Linux Enterprise Server 12 wicked versions prior to 0.6.60-3.5.1. SUSE Linux Enterprise Server 15 wicked versions prior to 0.6.60-3.21.1. openSUSE Leap 15.1 wicked versions prior to 0.6.60-lp151.2.6.1. openSUSE Factory wicked versions prior to 0.6.62.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18902/">CVE-2019-18902</cve>
	<bugzilla href="https://bugzilla.suse.com/1160903">SUSE bug 1160903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605508" comment="wicked-0.6.60-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277410" comment="wicked is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605509" comment="wicked-service-0.6.60-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277411" comment="wicked-service is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18903</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18903" ref_url="https://www.suse.com/security/cve/CVE-2019-18903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00011.html" source="SUSE-SU"/>
    <description>
    A Use After Free vulnerability in wicked of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Leap 15.1, Factory allows remote attackers to cause DoS or potentially code execution. This issue affects: SUSE Linux Enterprise Server 12 wicked versions prior to 0.6.60-2.18.1. SUSE Linux Enterprise Server 15 wicked versions prior to 0.6.60-28.26.1. openSUSE Leap 15.1 wicked versions prior to 0.6.60-lp151.2.9.1. openSUSE Factory wicked versions prior to 0.6.62.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18903/">CVE-2019-18903</cve>
	<bugzilla href="https://bugzilla.suse.com/1160904">SUSE bug 1160904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606390" comment="wicked-0.6.60-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277410" comment="wicked is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606391" comment="wicked-service-0.6.60-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277411" comment="wicked-service is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18904</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18904" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18904" ref_url="https://www.suse.com/security/cve/CVE-2019-18904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006778.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00026.html" source="SUSE-SU"/>
    <description>
    A Uncontrolled Resource Consumption vulnerability in rmt of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Public Cloud 15-SP1, SUSE Linux Enterprise Module for Server Applications 15, SUSE Linux Enterprise Module for Server Applications 15-SP1, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1 allows remote attackers to cause DoS against rmt by requesting migrations. This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise High Performance Computing 15-LTSS rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise Module for Public Cloud 15-SP1 rmt-server versions prior to 2.5.2-3.9.1. SUSE Linux Enterprise Module for Server Applications 15 rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise Module for Server Applications 15-SP1 rmt-server versions prior to 2.5.2-3.9.1. SUSE Linux Enterprise Server 15-LTSS rmt-server versions prior to 2.5.2-3.26.1. SUSE Linux Enterprise Server for SAP 15 rmt-server versions prior to 2.5.2-3.26.1. openSUSE Leap 15.1 rmt-server versions prior to 2.5.2-lp151.2.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18904/">CVE-2019-18904</cve>
	<bugzilla href="https://bugzilla.suse.com/1160922">SUSE bug 1160922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606923" comment="rmt-server-2.5.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606924" comment="rmt-server-config-2.5.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606925" comment="rmt-server-pubcloud-2.5.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18905</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18905" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18905" ref_url="https://www.suse.com/security/cve/CVE-2019-18905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0676-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00050.html" source="SUSE-SU"/>
    <description>
    A Insufficient Verification of Data Authenticity vulnerability in autoyast2 of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows remote attackers to MITM connections when deprecated and unused functionality of autoyast is used to create images. This issue affects: SUSE Linux Enterprise Server 12 autoyast2 version 4.1.9-3.9.1 and prior versions. SUSE Linux Enterprise Server 15 autoyast2 version 4.0.70-3.20.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18905/">CVE-2019-18905</cve>
	<bugzilla href="https://bugzilla.suse.com/1140711">SUSE bug 1140711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607975" comment="autoyast2-4.1.15-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283676" comment="autoyast2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607976" comment="autoyast2-installation-4.1.15-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283677" comment="autoyast2-installation is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18932</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18932" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18932" ref_url="https://www.suse.com/security/cve/CVE-2019-18932" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00063.html" source="SUSE-SU"/>
    <description>
    log.c in Squid Analysis Report Generator (sarg) through 2.3.11 allows local privilege escalation. By default, it uses a fixed temporary directory /tmp/sarg. As the root user, sarg creates this directory or reuses an existing one in an insecure manner. An attacker can pre-create the directory, and place symlinks in it (after winning a /tmp/sarg/denied.int_unsort race condition). The outcome will be corrupted or newly created files in privileged file system locations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18932/">CVE-2019-18932</cve>
	<bugzilla href="https://bugzilla.suse.com/1150554">SUSE bug 1150554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156643">SUSE bug 1156643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604581" comment="sarg-2.3.10-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277117" comment="sarg is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18934</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18934" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18934" ref_url="https://www.suse.com/security/cve/CVE-2019-18934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html" source="SUSE-SU"/>
    <description>
    Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18934/">CVE-2019-18934</cve>
	<bugzilla href="https://bugzilla.suse.com/1157268">SUSE bug 1157268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609138" comment="libunbound-devel-mini-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286672" comment="libunbound-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609139" comment="libunbound2-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177204" comment="libunbound2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609140" comment="unbound-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286673" comment="unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609141" comment="unbound-anchor-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177205" comment="unbound-anchor is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609142" comment="unbound-devel-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286674" comment="unbound-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609143" comment="unbound-munin-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286675" comment="unbound-munin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609144" comment="unbound-python-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286676" comment="unbound-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19036</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19036" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19036" ref_url="https://www.suse.com/security/cve/CVE-2019-19036" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-&gt;node) can be zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19036/">CVE-2019-19036</cve>
	<bugzilla href="https://bugzilla.suse.com/1157692">SUSE bug 1157692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19045</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19045" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<bugzilla href="https://bugzilla.suse.com/1161522">SUSE bug 1161522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19046</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<bugzilla href="https://bugzilla.suse.com/1157304">SUSE bug 1157304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19049</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19049" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<bugzilla href="https://bugzilla.suse.com/1157173">SUSE bug 1157173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19051</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19051" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<bugzilla href="https://bugzilla.suse.com/1159024">SUSE bug 1159024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19052</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19052" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19054</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<bugzilla href="https://bugzilla.suse.com/1161518">SUSE bug 1161518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19056</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19057</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<bugzilla href="https://bugzilla.suse.com/1157193">SUSE bug 1157193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19058</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<bugzilla href="https://bugzilla.suse.com/1157145">SUSE bug 1157145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19060</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<bugzilla href="https://bugzilla.suse.com/1157178">SUSE bug 1157178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19062</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19063</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19065</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because "rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem)."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173961">SUSE bug 1173961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19066</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19067</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<bugzilla href="https://bugzilla.suse.com/1157180">SUSE bug 1157180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<bugzilla href="https://bugzilla.suse.com/1157307">SUSE bug 1157307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19073</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19074</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19075</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<bugzilla href="https://bugzilla.suse.com/1157162">SUSE bug 1157162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173958">SUSE bug 1173958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19077</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<bugzilla href="https://bugzilla.suse.com/1157171">SUSE bug 1157171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19078</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19078" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<bugzilla href="https://bugzilla.suse.com/1157032">SUSE bug 1157032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19080</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<bugzilla href="https://bugzilla.suse.com/1157044">SUSE bug 1157044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19081</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<bugzilla href="https://bugzilla.suse.com/1157045">SUSE bug 1157045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19082</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<bugzilla href="https://bugzilla.suse.com/1157046">SUSE bug 1157046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19083</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<bugzilla href="https://bugzilla.suse.com/1157049">SUSE bug 1157049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19118</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19118" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19118" ref_url="https://www.suse.com/security/cve/CVE-2019-19118" source="SUSE CVE"/>
    <description>
    Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19118/">CVE-2019-19118</cve>
	<bugzilla href="https://bugzilla.suse.com/1157705">SUSE bug 1157705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609800" comment="python3-Django-2.2.8-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173965" comment="python3-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19191</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19191" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00017.html" source="SUSE-SU"/>
    <description>
    Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation. This allows the user to escalate to root by pointing symlinks to files such as /etc/shadow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191</cve>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606223" comment="libshibsp-lite7-2.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275714" comment="libshibsp-lite7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606224" comment="libshibsp7-2.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275715" comment="libshibsp7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606225" comment="shibboleth-sp-2.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167896" comment="shibboleth-sp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606226" comment="shibboleth-sp-devel-2.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167897" comment="shibboleth-sp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19227</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19227" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227</cve>
	<bugzilla href="https://bugzilla.suse.com/1157678">SUSE bug 1157678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19269</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19269" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19269" ref_url="https://www.suse.com/security/cve/CVE-2019-19269" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19269/">CVE-2019-19269</cve>
	<bugzilla href="https://bugzilla.suse.com/1157803">SUSE bug 1157803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609637" comment="proftpd-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153640" comment="proftpd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609638" comment="proftpd-devel-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153641" comment="proftpd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609639" comment="proftpd-doc-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153642" comment="proftpd-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609640" comment="proftpd-lang-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153643" comment="proftpd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609641" comment="proftpd-ldap-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153644" comment="proftpd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609642" comment="proftpd-mysql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153645" comment="proftpd-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609643" comment="proftpd-pgsql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153646" comment="proftpd-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609644" comment="proftpd-radius-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153647" comment="proftpd-radius is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609645" comment="proftpd-sqlite-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153648" comment="proftpd-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19270</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19270" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19270" ref_url="https://www.suse.com/security/cve/CVE-2019-19270" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. Failure to check for the appropriate field of a CRL entry (checking twice for subject, rather than once for subject and once for issuer) prevents some valid CRLs from being taken into account, and can allow clients whose certificates have been revoked to proceed with a connection to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19270/">CVE-2019-19270</cve>
	<bugzilla href="https://bugzilla.suse.com/1157798">SUSE bug 1157798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609637" comment="proftpd-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153640" comment="proftpd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609638" comment="proftpd-devel-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153641" comment="proftpd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609639" comment="proftpd-doc-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153642" comment="proftpd-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609640" comment="proftpd-lang-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153643" comment="proftpd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609641" comment="proftpd-ldap-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153644" comment="proftpd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609642" comment="proftpd-mysql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153645" comment="proftpd-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609643" comment="proftpd-pgsql-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153646" comment="proftpd-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609644" comment="proftpd-radius-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153647" comment="proftpd-radius is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609645" comment="proftpd-sqlite-1.3.6b-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153648" comment="proftpd-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19274</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19274" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19274" ref_url="https://www.suse.com/security/cve/CVE-2019-19274" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00012.html" source="SUSE-SU"/>
    <description>
    typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19274/">CVE-2019-19274</cve>
	<bugzilla href="https://bugzilla.suse.com/1161562">SUSE bug 1161562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607663" comment="python3-typed-ast-1.3.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009282465" comment="python3-typed-ast is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19275" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19275" ref_url="https://www.suse.com/security/cve/CVE-2019-19275" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00012.html" source="SUSE-SU"/>
    <description>
    typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19275/">CVE-2019-19275</cve>
	<bugzilla href="https://bugzilla.suse.com/1161563">SUSE bug 1161563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607663" comment="python3-typed-ast-1.3.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009282465" comment="python3-typed-ast is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19318</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19318" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19318" ref_url="https://www.suse.com/security/cve/CVE-2019-19318" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19318/">CVE-2019-19318</cve>
	<bugzilla href="https://bugzilla.suse.com/1158026">SUSE bug 1158026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19319</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319</cve>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19332</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19338</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19338" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338</cve>
	<bugzilla href="https://bugzilla.suse.com/1158954">SUSE bug 1158954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19344</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19344" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19344" ref_url="https://www.suse.com/security/cve/CVE-2019-19344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19344/">CVE-2019-19344</cve>
	<bugzilla href="https://bugzilla.suse.com/1160852">SUSE bug 1160852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604630" comment="ctdb-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604631" comment="ctdb-pcp-pmda-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604632" comment="ctdb-tests-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604633" comment="libdcerpc-binding0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604634" comment="libdcerpc-binding0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604635" comment="libdcerpc-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604636" comment="libdcerpc-samr-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604637" comment="libdcerpc-samr0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604638" comment="libdcerpc-samr0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604639" comment="libdcerpc0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604640" comment="libdcerpc0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604641" comment="libndr-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604642" comment="libndr-krb5pac-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604643" comment="libndr-krb5pac0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604644" comment="libndr-krb5pac0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604645" comment="libndr-nbt-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604646" comment="libndr-nbt0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604647" comment="libndr-nbt0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604648" comment="libndr-standard-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604649" comment="libndr-standard0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604650" comment="libndr-standard0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604651" comment="libndr0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604652" comment="libndr0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604653" comment="libnetapi-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604654" comment="libnetapi0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604655" comment="libnetapi0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604656" comment="libsamba-credentials-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604657" comment="libsamba-credentials0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604658" comment="libsamba-credentials0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604659" comment="libsamba-errors-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604660" comment="libsamba-errors0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604661" comment="libsamba-errors0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604662" comment="libsamba-hostconfig-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604663" comment="libsamba-hostconfig0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604664" comment="libsamba-hostconfig0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604665" comment="libsamba-passdb-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604666" comment="libsamba-passdb0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604667" comment="libsamba-passdb0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604668" comment="libsamba-policy-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604669" comment="libsamba-policy-python-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604670" comment="libsamba-policy-python3-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604671" comment="libsamba-policy0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604672" comment="libsamba-policy0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604673" comment="libsamba-policy0-python3-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604674" comment="libsamba-policy0-python3-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604675" comment="libsamba-util-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604676" comment="libsamba-util0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604677" comment="libsamba-util0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604678" comment="libsamdb-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604679" comment="libsamdb0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604680" comment="libsamdb0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604681" comment="libsmbclient-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604682" comment="libsmbclient0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604683" comment="libsmbclient0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604684" comment="libsmbconf-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604685" comment="libsmbconf0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604686" comment="libsmbconf0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604687" comment="libsmbldap-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604688" comment="libsmbldap2-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604689" comment="libsmbldap2-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604690" comment="libtevent-util-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604691" comment="libtevent-util0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604692" comment="libtevent-util0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604693" comment="libwbclient-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604694" comment="libwbclient0-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604695" comment="libwbclient0-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604696" comment="samba-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604697" comment="samba-ad-dc-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604698" comment="samba-ad-dc-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604699" comment="samba-ceph-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604700" comment="samba-client-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604701" comment="samba-client-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604702" comment="samba-core-devel-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604703" comment="samba-doc-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604704" comment="samba-dsdb-modules-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604705" comment="samba-libs-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604706" comment="samba-libs-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604707" comment="samba-libs-python-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604708" comment="samba-libs-python-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604709" comment="samba-libs-python3-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604710" comment="samba-libs-python3-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604711" comment="samba-pidl-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604712" comment="samba-python-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604713" comment="samba-python3-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604714" comment="samba-test-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604715" comment="samba-winbind-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604716" comment="samba-winbind-32bit-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19447</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19451</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19451" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19451" ref_url="https://www.suse.com/security/cve/CVE-2019-19451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3391-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193391-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00019.html" source="SUSE-SU"/>
    <description>
    When GNOME Dia before 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout. If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileges), thus filling up the disk and eventually rendering the system unusable. (The filename can be for a nonexistent file.) NOTE: this does not affect an upstream release, but affects certain Linux distribution packages with version numbers such as 0.97.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19451/">CVE-2019-19451</cve>
	<bugzilla href="https://bugzilla.suse.com/1158194">SUSE bug 1158194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606503" comment="dia-0.97.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151163" comment="dia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606504" comment="dia-lang-0.97.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151164" comment="dia-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19462</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19523</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19524</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19525</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19525" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19526</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19526" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158893">SUSE bug 1158893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19527" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19528</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19528" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158407">SUSE bug 1158407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19529</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19529" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19530</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19531</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19531" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158427">SUSE bug 1158427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19532</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19532" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19533</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19534</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19535</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19535" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19536</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19536" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19537</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19543" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19543" ref_url="https://www.suse.com/security/cve/CVE-2019-19543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19543/">CVE-2019-19543</cve>
	<bugzilla href="https://bugzilla.suse.com/1158427">SUSE bug 1158427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603892" comment="kernel-debug-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603893" comment="kernel-debug-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603894" comment="kernel-debug-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603895" comment="kernel-default-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603896" comment="kernel-default-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603897" comment="kernel-default-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603898" comment="kernel-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603899" comment="kernel-docs-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603900" comment="kernel-docs-html-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603901" comment="kernel-kvmsmall-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603902" comment="kernel-kvmsmall-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603903" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603904" comment="kernel-macros-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603905" comment="kernel-obs-build-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603906" comment="kernel-obs-qa-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603907" comment="kernel-source-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603908" comment="kernel-source-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603909" comment="kernel-syms-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603910" comment="kernel-vanilla-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603911" comment="kernel-vanilla-base-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603912" comment="kernel-vanilla-devel-4.12.14-lp151.28.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19553</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19553" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19553" ref_url="https://www.suse.com/security/cve/CVE-2019-19553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19553/">CVE-2019-19553</cve>
	<bugzilla href="https://bugzilla.suse.com/1158505">SUSE bug 1158505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19577</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19577" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given direct access to physical devices are vulnerable. Systems which do not use PCI pass-through are not vulnerable. Only HVM guests can exploit the vulnerability. PV and PVH guests cannot. All versions of Xen with IOMMU support are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604437" comment="xen-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604438" comment="xen-devel-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604439" comment="xen-doc-html-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604440" comment="xen-libs-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604441" comment="xen-libs-32bit-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604442" comment="xen-tools-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604443" comment="xen-tools-domU-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19578</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19578" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at itself, or to another pagetable of the same or higher level. Xen has limited support for linear pagetables: A page may either point to itself, or point to another pagetable of the same level (i.e., L2 to L2, L3 to L3, and so on). XSA-240 introduced an additional restriction that limited the "depth" of such chains by allowing pages to either *point to* other pages of the same level, or *be pointed to* by other pages of the same level, but not both. To implement this, we keep track of the number of outstanding times a page points to or is pointed to another page table, to prevent both from happening at the same time. Unfortunately, the original commit introducing this reset this count when resuming validation of a partially-validated pagetable, incorrectly dropping some "linear_pt_entry" counts. If an attacker could engineer such a situation to occur, they might be able to make loops or other arbitrary chains of linear pagetables, as described in XSA-240. A malicious or buggy PV guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Privilege escalation and information leaks cannot be excluded. All versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Only systems which have enabled linear pagetables are vulnerable. Systems which have disabled linear pagetables, either by selecting CONFIG_PV_LINEAR_PT=n when building the hypervisor, or adding pv-linear-pt=false on the command-line, are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604437" comment="xen-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604438" comment="xen-devel-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604439" comment="xen-doc-html-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604440" comment="xen-libs-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604441" comment="xen-libs-32bit-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604442" comment="xen-tools-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604443" comment="xen-tools-domU-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19579</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19579" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the use of libxl's "assignable-add" feature to prepare devices to be assigned to untrusted guests. Unfortunately, this is not considered a strictly required step for device assignment. The PCI passthrough documentation on the wiki describes alternate ways of preparing devices for assignment, and libvirt uses its own ways as well. Hosts where these "alternate" methods are used will still leave the system in a vulnerable state after the device comes back from a guest. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604437" comment="xen-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604438" comment="xen-devel-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604439" comment="xen-doc-html-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604440" comment="xen-libs-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604441" comment="xen-libs-32bit-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604442" comment="xen-tools-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604443" comment="xen-tools-domU-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19580</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19580" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in restartable PV type change operations. Despite extensive testing and auditing, some corner cases were missed. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All security-supported versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Note that these attacks require very precise timing, which may be difficult to exploit in practice.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604437" comment="xen-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604438" comment="xen-devel-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604439" comment="xen-doc-html-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604440" comment="xen-libs-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604441" comment="xen-libs-32bit-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604442" comment="xen-tools-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604443" comment="xen-tools-domU-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19581</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19581" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On 32-bit Arm accesses to bitmaps with bit a count which is a multiple of 32, an out of bounds access may occur. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. 32-bit Arm systems are vulnerable. 64-bit Arm systems are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581</cve>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604437" comment="xen-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604438" comment="xen-devel-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604439" comment="xen-doc-html-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604440" comment="xen-libs-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604441" comment="xen-libs-32bit-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604442" comment="xen-tools-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604443" comment="xen-tools-domU-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19582</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19582" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cause a denial of service (infinite loop) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On x86 accesses to bitmaps with a compile time known size of 64 may incur undefined behavior, which may in particular result in infinite loops. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. x86 systems with 64 or more nodes are vulnerable (there might not be any such systems that Xen would run on). x86 systems with less than 64 nodes are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582</cve>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604437" comment="xen-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604438" comment="xen-devel-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604439" comment="xen-doc-html-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604440" comment="xen-libs-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604441" comment="xen-libs-32bit-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604442" comment="xen-tools-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604443" comment="xen-tools-domU-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19583</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19583" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604437" comment="xen-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604438" comment="xen-devel-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604439" comment="xen-doc-html-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604440" comment="xen-libs-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604441" comment="xen-libs-32bit-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604442" comment="xen-tools-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604443" comment="xen-tools-domU-4.12.1_06-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19604</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604916" comment="perl-Authen-SASL-2.16-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277151" comment="perl-Authen-SASL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604917" comment="perl-Net-SMTP-SSL-1.04-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277152" comment="perl-Net-SMTP-SSL is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19724</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19724" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19724" ref_url="https://www.suse.com/security/cve/CVE-2019-19724" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html" source="SUSE-SU"/>
    <description>
    Insecure permissions (777) are set on $HOME/.singularity when it is newly created by Singularity (version from 3.3.0 to 3.5.1), which could lead to an information leak, and malicious redirection of operations performed against Sylabs cloud services.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19724/">CVE-2019-19724</cve>
	<bugzilla href="https://bugzilla.suse.com/1159550">SUSE bug 1159550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607664" comment="libsingularity1-2.6.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238039" comment="libsingularity1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604366" comment="singularity-3.6.0-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607666" comment="singularity-devel-2.6.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238041" comment="singularity-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19725</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19725" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00063.html" source="SUSE-SU"/>
    <description>
    sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725</cve>
	<bugzilla href="https://bugzilla.suse.com/1159104">SUSE bug 1159104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608195" comment="sysstat-12.0.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247516" comment="sysstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608196" comment="sysstat-isag-12.0.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247517" comment="sysstat-isag is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19727</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19727" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19727" ref_url="https://www.suse.com/security/cve/CVE-2019-19727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0228-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200228-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00038.html" source="SUSE-SU"/>
    <description>
    SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 has weak slurmdbd.conf permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19727/">CVE-2019-19727</cve>
	<bugzilla href="https://bugzilla.suse.com/1155784">SUSE bug 1155784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608980" comment="libpmi0-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608981" comment="libslurm33-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266850" comment="libslurm33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608982" comment="perl-slurm-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608983" comment="slurm-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608984" comment="slurm-auth-none-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608985" comment="slurm-config-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608986" comment="slurm-config-man-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608987" comment="slurm-cray-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608988" comment="slurm-devel-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608989" comment="slurm-doc-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608990" comment="slurm-hdf5-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608991" comment="slurm-lua-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608992" comment="slurm-munge-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608993" comment="slurm-node-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608994" comment="slurm-openlava-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608995" comment="slurm-pam_slurm-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608996" comment="slurm-plugins-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608997" comment="slurm-seff-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608998" comment="slurm-sjstat-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608999" comment="slurm-slurmdbd-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609000" comment="slurm-sql-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609001" comment="slurm-sview-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609002" comment="slurm-torque-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609003" comment="slurm-webdoc-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19728</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19728" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19728" ref_url="https://www.suse.com/security/cve/CVE-2019-19728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00038.html" source="SUSE-SU"/>
    <description>
    SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 executes srun --uid with incorrect privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19728/">CVE-2019-19728</cve>
	<bugzilla href="https://bugzilla.suse.com/1155784">SUSE bug 1155784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159692">SUSE bug 1159692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608980" comment="libpmi0-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608981" comment="libslurm33-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266850" comment="libslurm33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608982" comment="perl-slurm-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608983" comment="slurm-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608984" comment="slurm-auth-none-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608985" comment="slurm-config-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608986" comment="slurm-config-man-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608987" comment="slurm-cray-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608988" comment="slurm-devel-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608989" comment="slurm-doc-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608990" comment="slurm-hdf5-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608991" comment="slurm-lua-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608992" comment="slurm-munge-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608993" comment="slurm-node-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608994" comment="slurm-openlava-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608995" comment="slurm-pam_slurm-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608996" comment="slurm-plugins-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608997" comment="slurm-seff-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608998" comment="slurm-sjstat-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608999" comment="slurm-slurmdbd-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609000" comment="slurm-sql-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609001" comment="slurm-sview-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609002" comment="slurm-torque-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609003" comment="slurm-webdoc-18.08.9-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19768</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607273" comment="kernel-debug-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607274" comment="kernel-debug-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607275" comment="kernel-debug-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607276" comment="kernel-default-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607277" comment="kernel-default-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607278" comment="kernel-default-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607279" comment="kernel-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607280" comment="kernel-docs-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607281" comment="kernel-docs-html-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607282" comment="kernel-kvmsmall-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607283" comment="kernel-kvmsmall-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607284" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607285" comment="kernel-macros-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607286" comment="kernel-obs-build-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607287" comment="kernel-obs-qa-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607288" comment="kernel-source-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607289" comment="kernel-source-vanilla-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607290" comment="kernel-syms-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607291" comment="kernel-vanilla-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607292" comment="kernel-vanilla-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607293" comment="kernel-vanilla-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19770</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19770" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770</cve>
	<bugzilla href="https://bugzilla.suse.com/1159198">SUSE bug 1159198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607559" comment="kernel-debug-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607560" comment="kernel-debug-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607561" comment="kernel-debug-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607562" comment="kernel-default-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607563" comment="kernel-default-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607564" comment="kernel-default-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607565" comment="kernel-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607566" comment="kernel-docs-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607567" comment="kernel-docs-html-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607568" comment="kernel-kvmsmall-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607571" comment="kernel-macros-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607572" comment="kernel-obs-build-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607573" comment="kernel-obs-qa-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607574" comment="kernel-source-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607575" comment="kernel-source-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607576" comment="kernel-syms-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607577" comment="kernel-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607578" comment="kernel-vanilla-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607579" comment="kernel-vanilla-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19880</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19917</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19917" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19917" ref_url="https://www.suse.com/security/cve/CVE-2019-19917" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html" source="SUSE-SU"/>
    <description>
    Lout 3.40 has a buffer overflow in the StringQuotedWord() function in z39.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19917/">CVE-2019-19917</cve>
	<bugzilla href="https://bugzilla.suse.com/1159714">SUSE bug 1159714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605804" comment="lout-3.40-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297567" comment="lout is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19918</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19918" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19918" ref_url="https://www.suse.com/security/cve/CVE-2019-19918" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00010.html" source="SUSE-SU"/>
    <description>
    Lout 3.40 has a heap-based buffer overflow in the srcnext() function in z02.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19918/">CVE-2019-19918</cve>
	<bugzilla href="https://bugzilla.suse.com/1159713">SUSE bug 1159713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605804" comment="lout-3.40-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297567" comment="lout is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19921</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19921" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19921" ref_url="https://www.suse.com/security/cve/CVE-2019-19921" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html" source="SUSE-SU"/>
    <description>
    runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19921/">CVE-2019-19921</cve>
	<bugzilla href="https://bugzilla.suse.com/1160452">SUSE bug 1160452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606680" comment="docker-runc-1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19923</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923</cve>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19925</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925</cve>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19926</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19927</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19927" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19927" ref_url="https://www.suse.com/security/cve/CVE-2019-19927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19927/">CVE-2019-19927</cve>
	<bugzilla href="https://bugzilla.suse.com/1160147">SUSE bug 1160147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19948</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948</cve>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605640" comment="ImageMagick-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605641" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605642" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605643" comment="ImageMagick-devel-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605644" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605645" comment="ImageMagick-doc-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605646" comment="ImageMagick-extra-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605647" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605648" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605649" comment="libMagick++-devel-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605650" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605651" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605652" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605653" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605654" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605655" comment="perl-PerlMagick-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19949</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949</cve>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605640" comment="ImageMagick-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605641" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605642" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605643" comment="ImageMagick-devel-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605644" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605645" comment="ImageMagick-doc-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605646" comment="ImageMagick-extra-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605647" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605648" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605649" comment="libMagick++-devel-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605650" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605651" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605652" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605653" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605654" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605655" comment="perl-PerlMagick-7.0.7.34-lp151.7.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19950</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19950" ref_url="https://www.suse.com/security/cve/CVE-2019-19950" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190403 Q8, there is a use-after-free in ThrowException and ThrowLoggedException of magick/error.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19950/">CVE-2019-19950</cve>
	<bugzilla href="https://bugzilla.suse.com/1159852">SUSE bug 1159852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607594" comment="GraphicsMagick-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607595" comment="GraphicsMagick-devel-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607596" comment="libGraphicsMagick++-Q16-12-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607597" comment="libGraphicsMagick++-devel-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607598" comment="libGraphicsMagick-Q16-3-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607599" comment="libGraphicsMagick3-config-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607600" comment="libGraphicsMagickWand-Q16-2-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607601" comment="perl-GraphicsMagick-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19951</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19951" ref_url="https://www.suse.com/security/cve/CVE-2019-19951" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190423 Q8, there is a heap-based buffer overflow in the function ImportRLEPixels of coders/miff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19951/">CVE-2019-19951</cve>
	<bugzilla href="https://bugzilla.suse.com/1160321">SUSE bug 1160321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607594" comment="GraphicsMagick-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607595" comment="GraphicsMagick-devel-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607596" comment="libGraphicsMagick++-Q16-12-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607597" comment="libGraphicsMagick++-devel-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607598" comment="libGraphicsMagick-Q16-3-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607599" comment="libGraphicsMagick3-config-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607600" comment="libGraphicsMagickWand-Q16-2-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607601" comment="perl-GraphicsMagick-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19953</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19953" ref_url="https://www.suse.com/security/cve/CVE-2019-19953" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20191208 Q8, there is a heap-based buffer over-read in the function EncodeImage of coders/pict.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19953/">CVE-2019-19953</cve>
	<bugzilla href="https://bugzilla.suse.com/1160364">SUSE bug 1160364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607594" comment="GraphicsMagick-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607595" comment="GraphicsMagick-devel-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607596" comment="libGraphicsMagick++-Q16-12-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607597" comment="libGraphicsMagick++-devel-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607598" comment="libGraphicsMagick-Q16-3-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607599" comment="libGraphicsMagick3-config-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607600" comment="libGraphicsMagickWand-Q16-2-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607601" comment="perl-GraphicsMagick-1.3.29-lp151.4.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19956</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1532-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0681-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-05/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html" source="SUSE-SU"/>
    <description>
    xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-&gt;oldNs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608268" comment="libxml2-2-2.9.7-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608269" comment="libxml2-2-32bit-2.9.7-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608270" comment="libxml2-devel-2.9.7-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608271" comment="libxml2-devel-32bit-2.9.7-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608272" comment="libxml2-doc-2.9.7-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608273" comment="libxml2-tools-2.9.7-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608274" comment="python2-libxml2-python-2.9.7-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608275" comment="python3-libxml2-python-2.9.7-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19965</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19966</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19966" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966</cve>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20009</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20009" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20009" ref_url="https://www.suse.com/security/cve/CVE-2019-20009" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20009/">CVE-2019-20009</cve>
	<bugzilla href="https://bugzilla.suse.com/1159824">SUSE bug 1159824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20010</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20010" ref_url="https://www.suse.com/security/cve/CVE-2019-20010" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.92. There is a use-after-free in resolve_objectref_vector in decode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20010/">CVE-2019-20010</cve>
	<bugzilla href="https://bugzilla.suse.com/1159825">SUSE bug 1159825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20011</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20011" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20011" ref_url="https://www.suse.com/security/cve/CVE-2019-20011" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.92. There is a heap-based buffer over-read in decode_R13_R2000 in decode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20011/">CVE-2019-20011</cve>
	<bugzilla href="https://bugzilla.suse.com/1159826">SUSE bug 1159826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174236">SUSE bug 1174236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20012</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20012" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20012" ref_url="https://www.suse.com/security/cve/CVE-2019-20012" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_HATCH_private in dwg.spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20012/">CVE-2019-20012</cve>
	<bugzilla href="https://bugzilla.suse.com/1159827">SUSE bug 1159827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20013</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20013" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20013" ref_url="https://www.suse.com/security/cve/CVE-2019-20013" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in decode_3dsolid in dwg.spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20013/">CVE-2019-20013</cve>
	<bugzilla href="https://bugzilla.suse.com/1159828">SUSE bug 1159828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20014</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20014" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20014" ref_url="https://www.suse.com/security/cve/CVE-2019-20014" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG before 0.93. There is a double-free in dwg_free in free.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20014/">CVE-2019-20014</cve>
	<bugzilla href="https://bugzilla.suse.com/1159831">SUSE bug 1159831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20015</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20015" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20015" ref_url="https://www.suse.com/security/cve/CVE-2019-20015" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20015/">CVE-2019-20015</cve>
	<bugzilla href="https://bugzilla.suse.com/1159832">SUSE bug 1159832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20021</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20021" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20021" ref_url="https://www.suse.com/security/cve/CVE-2019-20021" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0163-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20021/">CVE-2019-20021</cve>
	<bugzilla href="https://bugzilla.suse.com/1159833">SUSE bug 1159833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605500" comment="upx-3.96-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165780" comment="upx is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20053</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20053" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20053" ref_url="https://www.suse.com/security/cve/CVE-2019-20053" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0163-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html" source="SUSE-SU"/>
    <description>
    An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20053/">CVE-2019-20053</cve>
	<bugzilla href="https://bugzilla.suse.com/1159920">SUSE bug 1159920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605500" comment="upx-3.96-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165780" comment="upx is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20054</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054</cve>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20095</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20095" ref_url="https://www.suse.com/security/cve/CVE-2019-20095" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20095/">CVE-2019-20095</cve>
	<bugzilla href="https://bugzilla.suse.com/1159909">SUSE bug 1159909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159914">SUSE bug 1159914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20096</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20096" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20367</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20367" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20367" ref_url="https://www.suse.com/security/cve/CVE-2019-20367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00043.html" source="SUSE-SU"/>
    <description>
    nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20367/">CVE-2019-20367</cve>
	<bugzilla href="https://bugzilla.suse.com/1160551">SUSE bug 1160551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608023" comment="libbsd-ctor-static-0.8.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283679" comment="libbsd-ctor-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608024" comment="libbsd-devel-0.8.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283680" comment="libbsd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608025" comment="libbsd0-0.8.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283681" comment="libbsd0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20372</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20372" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20372" ref_url="https://www.suse.com/security/cve/CVE-2019-20372" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00013.html" source="SUSE-SU"/>
    <description>
    NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-20372/">CVE-2019-20372</cve>
	<bugzilla href="https://bugzilla.suse.com/1160682">SUSE bug 1160682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606328" comment="nginx-1.14.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606329" comment="nginx-source-1.14.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266795" comment="nginx-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606330" comment="vim-plugin-nginx-1.14.2-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173966" comment="vim-plugin-nginx is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20382</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20382" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20382" ref_url="https://www.suse.com/security/cve/CVE-2019-20382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20382/">CVE-2019-20382</cve>
	<bugzilla href="https://bugzilla.suse.com/1165776">SUSE bug 1165776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607382" comment="qemu-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607383" comment="qemu-arm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607384" comment="qemu-audio-alsa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607385" comment="qemu-audio-oss-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607386" comment="qemu-audio-pa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607387" comment="qemu-audio-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607388" comment="qemu-block-curl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607389" comment="qemu-block-dmg-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607390" comment="qemu-block-gluster-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607391" comment="qemu-block-iscsi-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607392" comment="qemu-block-nfs-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607393" comment="qemu-block-rbd-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607394" comment="qemu-block-ssh-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607395" comment="qemu-extra-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607396" comment="qemu-guest-agent-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607397" comment="qemu-ipxe-1.0.0+-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607398" comment="qemu-ksm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607399" comment="qemu-kvm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607400" comment="qemu-lang-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607401" comment="qemu-linux-user-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607402" comment="qemu-ppc-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607403" comment="qemu-s390-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607404" comment="qemu-seabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607405" comment="qemu-sgabios-8-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607406" comment="qemu-tools-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607407" comment="qemu-ui-curses-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607408" comment="qemu-ui-gtk-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607409" comment="qemu-ui-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607410" comment="qemu-vgabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607411" comment="qemu-x86-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20386</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:48-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386</cve>
	<bugzilla href="https://bugzilla.suse.com/1161436">SUSE bug 1161436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606392" comment="libsystemd0-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154102" comment="libsystemd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606393" comment="libsystemd0-32bit-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154103" comment="libsystemd0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606394" comment="libsystemd0-mini-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154202" comment="libsystemd0-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606395" comment="libudev-devel-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151690" comment="libudev-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606396" comment="libudev-devel-32bit-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239129" comment="libudev-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606397" comment="libudev-mini-devel-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152578" comment="libudev-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606398" comment="libudev-mini1-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152579" comment="libudev-mini1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606399" comment="libudev1-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606400" comment="libudev1-32bit-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151692" comment="libudev1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606401" comment="nss-myhostname-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152580" comment="nss-myhostname is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606402" comment="nss-myhostname-32bit-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152581" comment="nss-myhostname-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606403" comment="nss-mymachines-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154203" comment="nss-mymachines is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606404" comment="nss-mymachines-32bit-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239130" comment="nss-mymachines-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606405" comment="nss-systemd-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239131" comment="nss-systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606406" comment="systemd-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606407" comment="systemd-32bit-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151694" comment="systemd-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606408" comment="systemd-bash-completion-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151695" comment="systemd-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606409" comment="systemd-container-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239132" comment="systemd-container is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606410" comment="systemd-coredump-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239133" comment="systemd-coredump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606411" comment="systemd-devel-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152582" comment="systemd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606412" comment="systemd-logger-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151696" comment="systemd-logger is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606413" comment="systemd-mini-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152584" comment="systemd-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606414" comment="systemd-mini-bash-completion-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154204" comment="systemd-mini-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606415" comment="systemd-mini-container-mini-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239134" comment="systemd-mini-container-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606416" comment="systemd-mini-coredump-mini-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239135" comment="systemd-mini-coredump-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606417" comment="systemd-mini-devel-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152585" comment="systemd-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606418" comment="systemd-mini-sysvinit-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152586" comment="systemd-mini-sysvinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606419" comment="systemd-sysvinit-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606420" comment="udev-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606421" comment="udev-mini-234-lp151.26.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152587" comment="udev-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20388</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0681-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-05/msg00124.html" source="SUSE-SU"/>
    <description>
    xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388</cve>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608033" comment="libxml2-2-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608034" comment="libxml2-2-32bit-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608035" comment="libxml2-devel-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608036" comment="libxml2-devel-32bit-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608037" comment="libxml2-doc-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608038" comment="libxml2-tools-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608039" comment="python2-libxml2-python-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608040" comment="python3-libxml2-python-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20446</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0629-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006618.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html" source="SUSE-SU"/>
    <description>
    In xml.rs in GNOME librsvg before 2.46.2, a crafted SVG file with nested patterns can cause denial of service when passed to the library for processing. The attacker constructs pattern elements so that the number of final rendered objects grows exponentially.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446</cve>
	<bugzilla href="https://bugzilla.suse.com/1162501">SUSE bug 1162501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607126" comment="gdk-pixbuf-loader-rsvg-2.42.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151634" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607127" comment="gdk-pixbuf-loader-rsvg-32bit-2.42.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153668" comment="gdk-pixbuf-loader-rsvg-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607128" comment="librsvg-2-2-2.42.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151635" comment="librsvg-2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607129" comment="librsvg-2-2-32bit-2.42.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153670" comment="librsvg-2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607130" comment="librsvg-devel-2.42.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151636" comment="librsvg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607131" comment="rsvg-thumbnailer-2.42.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161885" comment="rsvg-thumbnailer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607132" comment="rsvg-view-2.42.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153671" comment="rsvg-view is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607133" comment="typelib-1_0-Rsvg-2_0-2.42.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151637" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20479</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20479" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20479" ref_url="https://www.suse.com/security/cve/CVE-2019-20479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006619.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00036.html" source="SUSE-SU"/>
    <description>
    A flaw was found in mod_auth_openidc before version 2.4.1. An open redirect issue exists in URLs with a slash and backslash at the beginning.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20479/">CVE-2019-20479</cve>
	<bugzilla href="https://bugzilla.suse.com/1164459">SUSE bug 1164459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607231" comment="apache2-mod_auth_openidc-2.3.8-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270746" comment="apache2-mod_auth_openidc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20503</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607063" comment="MozillaFirefox-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607064" comment="MozillaFirefox-branding-upstream-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607065" comment="MozillaFirefox-buildsymbols-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607066" comment="MozillaFirefox-devel-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607067" comment="MozillaFirefox-translations-common-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607068" comment="MozillaFirefox-translations-other-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607177" comment="MozillaThunderbird-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607178" comment="MozillaThunderbird-translations-common-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607179" comment="MozillaThunderbird-translations-other-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609801" comment="chromedriver-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609802" comment="chromium-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20637</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20637" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20637" ref_url="https://www.suse.com/security/cve/CVE-2019-20637" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0808-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such as data structures associated with previous requests within this connection or VCL-related temporary headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20637/">CVE-2019-20637</cve>
	<bugzilla href="https://bugzilla.suse.com/1169040">SUSE bug 1169040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608822" comment="libvarnishapi2-6.2.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265429" comment="libvarnishapi2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608823" comment="varnish-6.2.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265431" comment="varnish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608824" comment="varnish-devel-6.2.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265433" comment="varnish-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20787</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20787" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20787" ref_url="https://www.suse.com/security/cve/CVE-2019-20787" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00045.html" source="SUSE-SU"/>
    <description>
    Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-20787/">CVE-2019-20787</cve>
	<bugzilla href="https://bugzilla.suse.com/1170253">SUSE bug 1170253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607647" comment="teeworlds-0.7.5-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266800" comment="teeworlds is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20788</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1164-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html" source="SUSE-SU"/>
    <description>
    libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173698">SUSE bug 1173698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607859" comment="LibVNCServer-devel-0.9.10-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607860" comment="libvncclient0-0.9.10-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607861" comment="libvncserver0-0.9.10-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20797" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20797" ref_url="https://www.suse.com/security/cve/CVE-2019-20797" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0820-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00028.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in e6y prboom-plus 2.5.1.5. There is a buffer overflow in client and server code responsible for handling received UDP packets, as demonstrated by I_SendPacket or I_SendPacketTo in i_network.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20797/">CVE-2019-20797</cve>
	<bugzilla href="https://bugzilla.suse.com/1171974">SUSE bug 1171974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608821" comment="prboom-plus-2.5.1.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285688" comment="prboom-plus is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20806</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20806" ref_url="https://www.suse.com/security/cve/CVE-2019-20806" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20806/">CVE-2019-20806</cve>
	<bugzilla href="https://bugzilla.suse.com/1172199">SUSE bug 1172199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20807</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006896.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0794-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html" source="SUSE-SU"/>
    <description>
    In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608458" comment="gvim-8.0.1568-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151192" comment="gvim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608459" comment="vim-8.0.1568-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151193" comment="vim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608460" comment="vim-data-8.0.1568-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151194" comment="vim-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608461" comment="vim-data-common-8.0.1568-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20810</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20839</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20839" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20840</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20840" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20907</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604953" comment="libpython2_7-1_0-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604954" comment="libpython2_7-1_0-32bit-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606883" comment="libpython3_6m1_0-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606884" comment="libpython3_6m1_0-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604955" comment="python-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604956" comment="python-32bit-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604957" comment="python-base-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604958" comment="python-base-32bit-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604959" comment="python-curses-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604960" comment="python-demo-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604961" comment="python-devel-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604962" comment="python-doc-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604963" comment="python-doc-pdf-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604964" comment="python-gdbm-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604965" comment="python-idle-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604966" comment="python-tk-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604967" comment="python-xml-2.7.17-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606885" comment="python3-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606886" comment="python3-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606887" comment="python3-base-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606888" comment="python3-base-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606889" comment="python3-curses-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606890" comment="python3-dbm-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606891" comment="python3-devel-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606892" comment="python3-doc-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606893" comment="python3-doc-devhelp-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606894" comment="python3-idle-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606895" comment="python3-testsuite-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606896" comment="python3-tk-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606897" comment="python3-tools-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20908</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20908" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20908" ref_url="https://www.suse.com/security/cve/CVE-2019-20908" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20908/">CVE-2019-20908</cve>
	<bugzilla href="https://bugzilla.suse.com/1173567">SUSE bug 1173567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174187">SUSE bug 1174187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20916</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010862.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG3I7MSGZF7WN3YNM7ML4QMO6MXYUU73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KXU352TPOYPGUNSKDJRXFXWPD5NF32K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DKY5FFZVXAPBL5ATB6LJG4VYEF3GOLN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3AA6BSUJEGBBKUCQO6J25OSG7PA6ZKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2185-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOMPFK5R4IK4IFOQTL5NIJK6DKSYRSXT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2GBJR7SZL3UIJETOGQDYOPIODBESJYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/623Y5GJHFGANTQ36ECKXIXY3QVKGYSCE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EUMJS3WWV7Y2IVJFRMZNDUXZBSPWORBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT6BSX5663NCXU3Y4KR3RA3RQHJMCFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AKEBUCTPHZWXJGF6EWK7HBTO726SP2Y/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606665" comment="libpython2_7-1_0-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606666" comment="libpython2_7-1_0-32bit-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606681" comment="libpython3_6m1_0-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606682" comment="libpython3_6m1_0-32bit-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606667" comment="python-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606668" comment="python-32bit-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606669" comment="python-base-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606670" comment="python-base-32bit-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606671" comment="python-curses-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606672" comment="python-demo-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606673" comment="python-devel-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606674" comment="python-doc-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606675" comment="python-doc-pdf-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606676" comment="python-gdbm-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606677" comment="python-idle-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606678" comment="python-tk-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606679" comment="python-xml-2.7.17-lp151.10.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606640" comment="python2-pip-10.0.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294865" comment="python2-pip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606641" comment="python2-pip-wheel-10.0.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009337921" comment="python2-pip-wheel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606644" comment="python2-setuptools-40.5.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303045" comment="python2-setuptools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606645" comment="python2-setuptools-test-40.5.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303046" comment="python2-setuptools-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606646" comment="python2-setuptools-wheel-40.5.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303047" comment="python2-setuptools-wheel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606683" comment="python3-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606684" comment="python3-32bit-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606685" comment="python3-base-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606686" comment="python3-base-32bit-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606687" comment="python3-curses-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606688" comment="python3-dbm-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606689" comment="python3-devel-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606690" comment="python3-idle-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606642" comment="python3-pip-10.0.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151932" comment="python3-pip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606643" comment="python3-pip-wheel-10.0.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009337922" comment="python3-pip-wheel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606647" comment="python3-setuptools-40.5.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303048" comment="python3-setuptools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606648" comment="python3-setuptools-test-40.5.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303049" comment="python3-setuptools-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606649" comment="python3-setuptools-wheel-40.5.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303050" comment="python3-setuptools-wheel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606691" comment="python3-testsuite-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606692" comment="python3-tk-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606693" comment="python3-tools-3.6.12-lp151.6.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20919</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20919" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00013.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605499" comment="perl-DBI-1.639-lp151.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20934</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20934" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934</cve>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2126</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2126" ref_url="https://www.suse.com/security/cve/CVE-2019-2126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html" source="SUSE-SU"/>
    <description>
    In ParseContentEncodingEntry of mkvparser.cc, there is a possible double free due to a missing reset of a freed pointer. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-127702368.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2126/">CVE-2019-2126</cve>
	<bugzilla href="https://bugzilla.suse.com/1160611">SUSE bug 1160611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604374" comment="libvpx-devel-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170222" comment="libvpx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604375" comment="libvpx4-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177224" comment="libvpx4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604376" comment="libvpx4-32bit-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277006" comment="libvpx4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604377" comment="vpx-tools-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170228" comment="vpx-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2201</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2971-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html" source="SUSE-SU"/>
    <description>
    In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603725" comment="libjpeg-turbo-1.5.3-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152540" comment="libjpeg-turbo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603726" comment="libjpeg62-62.2.0-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152541" comment="libjpeg62 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603727" comment="libjpeg62-32bit-62.2.0-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166381" comment="libjpeg62-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603728" comment="libjpeg62-devel-62.2.0-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152542" comment="libjpeg62-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603729" comment="libjpeg62-devel-32bit-62.2.0-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166384" comment="libjpeg62-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603730" comment="libjpeg62-turbo-1.5.3-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166386" comment="libjpeg62-turbo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603731" comment="libjpeg8-8.1.2-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152543" comment="libjpeg8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603732" comment="libjpeg8-32bit-8.1.2-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152544" comment="libjpeg8-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603733" comment="libjpeg8-devel-8.1.2-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166390" comment="libjpeg8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603734" comment="libjpeg8-devel-32bit-8.1.2-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166392" comment="libjpeg8-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603735" comment="libturbojpeg0-8.1.2-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152545" comment="libturbojpeg0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603736" comment="libturbojpeg0-32bit-8.1.2-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166395" comment="libturbojpeg0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2435</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2435" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2435" ref_url="https://www.suse.com/security/cve/CVE-2019-2435" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00053.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/Python). Supported versions that are affected are 8.0.13 and prior and 2.1.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Connectors accessible data as well as unauthorized access to critical data or complete access to all MySQL Connectors accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2435/">CVE-2019-2435</cve>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122204">SUSE bug 1122204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607320" comment="python2-mysql-connector-python-8.0.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280811" comment="python2-mysql-connector-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607321" comment="python3-mysql-connector-python-8.0.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280812" comment="python3-mysql-connector-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2446</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2446" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2446" ref_url="https://www.suse.com/security/cve/CVE-2019-2446" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2446/">CVE-2019-2446</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2448</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2448" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2448" ref_url="https://www.suse.com/security/cve/CVE-2019-2448" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2448/">CVE-2019-2448</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2450</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2450" ref_url="https://www.suse.com/security/cve/CVE-2019-2450" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2450/">CVE-2019-2450</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2451</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2451" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2451" ref_url="https://www.suse.com/security/cve/CVE-2019-2451" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2451/">CVE-2019-2451</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2508</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2508" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2508" ref_url="https://www.suse.com/security/cve/CVE-2019-2508" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2508/">CVE-2019-2508</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2509</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2509" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2509" ref_url="https://www.suse.com/security/cve/CVE-2019-2509" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2509/">CVE-2019-2509</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2511</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2511" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2511" ref_url="https://www.suse.com/security/cve/CVE-2019-2511" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via SOAP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2511/">CVE-2019-2511</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2525</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2525" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2525" ref_url="https://www.suse.com/security/cve/CVE-2019-2525" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2525/">CVE-2019-2525</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2527" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2527" ref_url="https://www.suse.com/security/cve/CVE-2019-2527" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.26 and prior to 6.0.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2527/">CVE-2019-2527</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2554</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2554" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2554" ref_url="https://www.suse.com/security/cve/CVE-2019-2554" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2554/">CVE-2019-2554</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2555</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2555" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2555" ref_url="https://www.suse.com/security/cve/CVE-2019-2555" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2555/">CVE-2019-2555</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2556" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2556" ref_url="https://www.suse.com/security/cve/CVE-2019-2556" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2556/">CVE-2019-2556</cve>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2574</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2574" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2574" ref_url="https://www.suse.com/security/cve/CVE-2019-2574" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2574/">CVE-2019-2574</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2614</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2614" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602108" comment="libmariadb-devel-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602109" comment="libmariadb3-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602110" comment="libmariadb3-32bit-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602111" comment="libmariadb_plugins-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602112" comment="libmariadbprivate-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602113" comment="libmysqld-devel-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602114" comment="libmysqld19-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602115" comment="mariadb-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602116" comment="mariadb-bench-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602117" comment="mariadb-client-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602118" comment="mariadb-errormessages-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602119" comment="mariadb-galera-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602120" comment="mariadb-test-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602121" comment="mariadb-tools-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2627</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2627" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602108" comment="libmariadb-devel-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602109" comment="libmariadb3-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602110" comment="libmariadb3-32bit-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602111" comment="libmariadb_plugins-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602112" comment="libmariadbprivate-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602113" comment="libmysqld-devel-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602114" comment="libmysqld19-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602115" comment="mariadb-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602116" comment="mariadb-bench-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602117" comment="mariadb-client-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602118" comment="mariadb-errormessages-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602119" comment="mariadb-galera-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602120" comment="mariadb-test-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602121" comment="mariadb-tools-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2628</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2628" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628</cve>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602108" comment="libmariadb-devel-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602109" comment="libmariadb3-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602110" comment="libmariadb3-32bit-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602111" comment="libmariadb_plugins-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602112" comment="libmariadbprivate-3.1.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602113" comment="libmysqld-devel-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602114" comment="libmysqld19-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602115" comment="mariadb-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602116" comment="mariadb-bench-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602117" comment="mariadb-client-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602118" comment="mariadb-errormessages-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602119" comment="mariadb-galera-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602120" comment="mariadb-test-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602121" comment="mariadb-tools-10.2.25-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2656</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2656" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2656" ref_url="https://www.suse.com/security/cve/CVE-2019-2656" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2656/">CVE-2019-2656</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2657</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2657" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2657" ref_url="https://www.suse.com/security/cve/CVE-2019-2657" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2657/">CVE-2019-2657</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2678" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2678" ref_url="https://www.suse.com/security/cve/CVE-2019-2678" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2678/">CVE-2019-2678</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2679</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2679" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2679" ref_url="https://www.suse.com/security/cve/CVE-2019-2679" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2679/">CVE-2019-2679</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2680</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2680" ref_url="https://www.suse.com/security/cve/CVE-2019-2680" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2680/">CVE-2019-2680</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2690</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2690" ref_url="https://www.suse.com/security/cve/CVE-2019-2690" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2690/">CVE-2019-2690</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2696" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2696" ref_url="https://www.suse.com/security/cve/CVE-2019-2696" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2696/">CVE-2019-2696</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2703</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2703" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2703" ref_url="https://www.suse.com/security/cve/CVE-2019-2703" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2703/">CVE-2019-2703</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2721</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2721" ref_url="https://www.suse.com/security/cve/CVE-2019-2721" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2721/">CVE-2019-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2722</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2722" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2722" ref_url="https://www.suse.com/security/cve/CVE-2019-2722" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2722/">CVE-2019-2722</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2723</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2723" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2723" ref_url="https://www.suse.com/security/cve/CVE-2019-2723" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2723/">CVE-2019-2723</cve>
	<bugzilla href="https://bugzilla.suse.com/1132827">SUSE bug 1132827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2737</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603932" comment="libmysqld-devel-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603933" comment="libmysqld19-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603934" comment="mariadb-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603935" comment="mariadb-bench-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603936" comment="mariadb-client-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603937" comment="mariadb-errormessages-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603938" comment="mariadb-galera-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603939" comment="mariadb-test-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603940" comment="mariadb-tools-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2739</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2739" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603932" comment="libmysqld-devel-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603933" comment="libmysqld19-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603934" comment="mariadb-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603935" comment="mariadb-bench-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603936" comment="mariadb-client-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603937" comment="mariadb-errormessages-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603938" comment="mariadb-galera-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603939" comment="mariadb-test-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603940" comment="mariadb-tools-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2740</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603932" comment="libmysqld-devel-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603933" comment="libmysqld19-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603934" comment="mariadb-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603935" comment="mariadb-bench-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603936" comment="mariadb-client-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603937" comment="mariadb-errormessages-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603938" comment="mariadb-galera-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603939" comment="mariadb-test-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603940" comment="mariadb-tools-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2745</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602128" comment="java-11-openjdk-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602129" comment="java-11-openjdk-accessibility-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602130" comment="java-11-openjdk-demo-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602131" comment="java-11-openjdk-devel-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602132" comment="java-11-openjdk-headless-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602133" comment="java-11-openjdk-javadoc-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602134" comment="java-11-openjdk-jmods-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602135" comment="java-11-openjdk-src-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602101" comment="java-1_8_0-openjdk-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602102" comment="java-1_8_0-openjdk-accessibility-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602103" comment="java-1_8_0-openjdk-demo-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602104" comment="java-1_8_0-openjdk-devel-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602105" comment="java-1_8_0-openjdk-headless-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602106" comment="java-1_8_0-openjdk-javadoc-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602107" comment="java-1_8_0-openjdk-src-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2758</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2758" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758</cve>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603932" comment="libmysqld-devel-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603933" comment="libmysqld19-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603934" comment="mariadb-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603935" comment="mariadb-bench-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603936" comment="mariadb-client-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603937" comment="mariadb-errormessages-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603938" comment="mariadb-galera-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603939" comment="mariadb-test-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603940" comment="mariadb-tools-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2762</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602128" comment="java-11-openjdk-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602129" comment="java-11-openjdk-accessibility-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602130" comment="java-11-openjdk-demo-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602131" comment="java-11-openjdk-devel-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602132" comment="java-11-openjdk-headless-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602133" comment="java-11-openjdk-javadoc-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602134" comment="java-11-openjdk-jmods-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602135" comment="java-11-openjdk-src-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602101" comment="java-1_8_0-openjdk-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602102" comment="java-1_8_0-openjdk-accessibility-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602103" comment="java-1_8_0-openjdk-demo-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602104" comment="java-1_8_0-openjdk-devel-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602105" comment="java-1_8_0-openjdk-headless-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602106" comment="java-1_8_0-openjdk-javadoc-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602107" comment="java-1_8_0-openjdk-src-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2766</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2766" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602128" comment="java-11-openjdk-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602129" comment="java-11-openjdk-accessibility-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602130" comment="java-11-openjdk-demo-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602131" comment="java-11-openjdk-devel-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602132" comment="java-11-openjdk-headless-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602133" comment="java-11-openjdk-javadoc-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602134" comment="java-11-openjdk-jmods-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602135" comment="java-11-openjdk-src-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602101" comment="java-1_8_0-openjdk-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602102" comment="java-1_8_0-openjdk-accessibility-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602103" comment="java-1_8_0-openjdk-demo-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602104" comment="java-1_8_0-openjdk-devel-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602105" comment="java-1_8_0-openjdk-headless-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602106" comment="java-1_8_0-openjdk-javadoc-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602107" comment="java-1_8_0-openjdk-src-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602128" comment="java-11-openjdk-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602129" comment="java-11-openjdk-accessibility-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602130" comment="java-11-openjdk-demo-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602131" comment="java-11-openjdk-devel-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602132" comment="java-11-openjdk-headless-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602133" comment="java-11-openjdk-javadoc-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602134" comment="java-11-openjdk-jmods-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602135" comment="java-11-openjdk-src-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602101" comment="java-1_8_0-openjdk-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602102" comment="java-1_8_0-openjdk-accessibility-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602103" comment="java-1_8_0-openjdk-demo-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602104" comment="java-1_8_0-openjdk-devel-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602105" comment="java-1_8_0-openjdk-headless-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602106" comment="java-1_8_0-openjdk-javadoc-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602107" comment="java-1_8_0-openjdk-src-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2786</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602128" comment="java-11-openjdk-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602129" comment="java-11-openjdk-accessibility-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602130" comment="java-11-openjdk-demo-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602131" comment="java-11-openjdk-devel-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602132" comment="java-11-openjdk-headless-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602133" comment="java-11-openjdk-javadoc-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602134" comment="java-11-openjdk-jmods-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602135" comment="java-11-openjdk-src-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602101" comment="java-1_8_0-openjdk-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602102" comment="java-1_8_0-openjdk-accessibility-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602103" comment="java-1_8_0-openjdk-demo-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602104" comment="java-1_8_0-openjdk-devel-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602105" comment="java-1_8_0-openjdk-headless-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602106" comment="java-1_8_0-openjdk-javadoc-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602107" comment="java-1_8_0-openjdk-src-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2805</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603932" comment="libmysqld-devel-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603933" comment="libmysqld19-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603934" comment="mariadb-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603935" comment="mariadb-bench-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603936" comment="mariadb-client-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603937" comment="mariadb-errormessages-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603938" comment="mariadb-galera-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603939" comment="mariadb-test-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603940" comment="mariadb-tools-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2816</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602128" comment="java-11-openjdk-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602129" comment="java-11-openjdk-accessibility-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602130" comment="java-11-openjdk-demo-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602131" comment="java-11-openjdk-devel-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602132" comment="java-11-openjdk-headless-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602133" comment="java-11-openjdk-javadoc-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602134" comment="java-11-openjdk-jmods-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602135" comment="java-11-openjdk-src-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602101" comment="java-1_8_0-openjdk-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602102" comment="java-1_8_0-openjdk-accessibility-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602103" comment="java-1_8_0-openjdk-demo-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602104" comment="java-1_8_0-openjdk-devel-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602105" comment="java-1_8_0-openjdk-headless-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602106" comment="java-1_8_0-openjdk-javadoc-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602107" comment="java-1_8_0-openjdk-src-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2818</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2818" ref_url="https://www.suse.com/security/cve/CVE-2019-2818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2818/">CVE-2019-2818</cve>
	<bugzilla href="https://bugzilla.suse.com/1141788">SUSE bug 1141788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602128" comment="java-11-openjdk-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602129" comment="java-11-openjdk-accessibility-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602130" comment="java-11-openjdk-demo-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602131" comment="java-11-openjdk-devel-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602132" comment="java-11-openjdk-headless-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602133" comment="java-11-openjdk-javadoc-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602134" comment="java-11-openjdk-jmods-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602135" comment="java-11-openjdk-src-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2821</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2821" ref_url="https://www.suse.com/security/cve/CVE-2019-2821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2821/">CVE-2019-2821</cve>
	<bugzilla href="https://bugzilla.suse.com/1141781">SUSE bug 1141781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602128" comment="java-11-openjdk-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602129" comment="java-11-openjdk-accessibility-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602130" comment="java-11-openjdk-demo-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602131" comment="java-11-openjdk-devel-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602132" comment="java-11-openjdk-headless-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602133" comment="java-11-openjdk-javadoc-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602134" comment="java-11-openjdk-jmods-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602135" comment="java-11-openjdk-src-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2842</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602101" comment="java-1_8_0-openjdk-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602102" comment="java-1_8_0-openjdk-accessibility-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602103" comment="java-1_8_0-openjdk-demo-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602104" comment="java-1_8_0-openjdk-devel-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602105" comment="java-1_8_0-openjdk-headless-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602106" comment="java-1_8_0-openjdk-javadoc-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602107" comment="java-1_8_0-openjdk-src-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2848</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2848" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2848" ref_url="https://www.suse.com/security/cve/CVE-2019-2848" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2848/">CVE-2019-2848</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2850</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2850" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2850" ref_url="https://www.suse.com/security/cve/CVE-2019-2850" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 2.8 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-2850/">CVE-2019-2850</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2859</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2859" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2859" ref_url="https://www.suse.com/security/cve/CVE-2019-2859" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2859/">CVE-2019-2859</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2863" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2863" ref_url="https://www.suse.com/security/cve/CVE-2019-2863" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2863/">CVE-2019-2863</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2864</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2864" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2864" ref_url="https://www.suse.com/security/cve/CVE-2019-2864" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2864/">CVE-2019-2864</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2865</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2865" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2865" ref_url="https://www.suse.com/security/cve/CVE-2019-2865" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2865/">CVE-2019-2865</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2866</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2866" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2866" ref_url="https://www.suse.com/security/cve/CVE-2019-2866" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2866/">CVE-2019-2866</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2867</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2867" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2867" ref_url="https://www.suse.com/security/cve/CVE-2019-2867" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2867/">CVE-2019-2867</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2873</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2873" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2873" ref_url="https://www.suse.com/security/cve/CVE-2019-2873" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-2873/">CVE-2019-2873</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2874</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2874" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2874" ref_url="https://www.suse.com/security/cve/CVE-2019-2874" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-2874/">CVE-2019-2874</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2875</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2875" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2875" ref_url="https://www.suse.com/security/cve/CVE-2019-2875" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-2875/">CVE-2019-2875</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2876</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2876" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2876" ref_url="https://www.suse.com/security/cve/CVE-2019-2876" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-2876/">CVE-2019-2876</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2877</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2877" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2877" ref_url="https://www.suse.com/security/cve/CVE-2019-2877" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2877/">CVE-2019-2877</cve>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602008" comment="python3-virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602009" comment="virtualbox-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602010" comment="virtualbox-devel-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602011" comment="virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602012" comment="virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152063" comment="virtualbox-guest-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602013" comment="virtualbox-guest-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602014" comment="virtualbox-guest-tools-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602015" comment="virtualbox-guest-x11-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602016" comment="virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152066" comment="virtualbox-host-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602017" comment="virtualbox-host-source-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602018" comment="virtualbox-qt-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602019" comment="virtualbox-vnc-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602020" comment="virtualbox-websrv-6.0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2894</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2933</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2933" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2938</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2938" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938</cve>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603932" comment="libmysqld-devel-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603933" comment="libmysqld19-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603934" comment="mariadb-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603935" comment="mariadb-bench-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603936" comment="mariadb-client-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603937" comment="mariadb-errormessages-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603938" comment="mariadb-galera-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603939" comment="mariadb-test-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603940" comment="mariadb-tools-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2945</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2949</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2958</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2958" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2962</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2964</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603932" comment="libmysqld-devel-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603933" comment="libmysqld19-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603934" comment="mariadb-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603935" comment="mariadb-bench-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603936" comment="mariadb-client-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603937" comment="mariadb-errormessages-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603938" comment="mariadb-galera-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603939" comment="mariadb-test-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603940" comment="mariadb-tools-10.2.29-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2975</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2977</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2977" ref_url="https://www.suse.com/security/cve/CVE-2019-2977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2977/">CVE-2019-2977</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2978</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2981</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2987</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2988</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2989</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2992</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2999</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603762" comment="java-11-openjdk-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603763" comment="java-11-openjdk-accessibility-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603764" comment="java-11-openjdk-demo-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603765" comment="java-11-openjdk-devel-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603766" comment="java-11-openjdk-headless-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603767" comment="java-11-openjdk-javadoc-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603768" comment="java-11-openjdk-jmods-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603769" comment="java-11-openjdk-src-11.0.5.0-lp151.3.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603922" comment="java-1_8_0-openjdk-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603923" comment="java-1_8_0-openjdk-accessibility-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603924" comment="java-1_8_0-openjdk-demo-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603925" comment="java-1_8_0-openjdk-devel-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603926" comment="java-1_8_0-openjdk-headless-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603927" comment="java-1_8_0-openjdk-javadoc-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603928" comment="java-1_8_0-openjdk-src-1.8.0.232-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3681</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3681" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3681" ref_url="https://www.suse.com/security/cve/CVE-2019-3681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0852-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00046.html" source="SUSE-SU"/>
    <description>
    A External Control of File Name or Path vulnerability in osc of SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Software Development Kit 12-SP5, SUSE Linux Enterprise Software Development Kit 12-SP4; openSUSE Leap 15.1, openSUSE Factory allowed remote attackers that can change downloaded packages to overwrite arbitrary files. This issue affects: SUSE Linux Enterprise Module for Development Tools 15 osc versions prior to 0.169.1-3.20.1. SUSE Linux Enterprise Software Development Kit 12-SP5 osc versions prior to 0.162.1-15.9.1. SUSE Linux Enterprise Software Development Kit 12-SP4 osc versions prior to 0.162.1-15.9.1. openSUSE Leap 15.1 osc versions prior to 0.169.1-lp151.2.15.1. openSUSE Factory osc versions prior to 0.169.0 .
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3681/">CVE-2019-3681</cve>
	<bugzilla href="https://bugzilla.suse.com/1122675">SUSE bug 1122675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609016" comment="osc-0.169.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151686" comment="osc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3685</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3685" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3685" ref_url="https://www.suse.com/security/cve/CVE-2019-3685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00007.html" source="SUSE-SU"/>
    <description>
    Open Build Service before version 0.165.4 diddn't validate TLS certificates for HTTPS connections with the osc client binary
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3685/">CVE-2019-3685</cve>
	<bugzilla href="https://bugzilla.suse.com/1142518">SUSE bug 1142518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142662">SUSE bug 1142662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602042" comment="osc-0.165.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151686" comment="osc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3687</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3687" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3687" ref_url="https://www.suse.com/security/cve/CVE-2019-3687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    The permission package in SUSE Linux Enterprise Server allowed all local users to run dumpcap in the "easy" permission profile and sniff network traffic. This issue affects: SUSE Linux Enterprise Server permissions versions starting from 85c83fef7e017f8ab7f8602d3163786d57344439 to 081d081dcfaf61710bda34bc21c80c66276119aa.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3687/">CVE-2019-3687</cve>
	<bugzilla href="https://bugzilla.suse.com/1148788">SUSE bug 1148788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180102">SUSE bug 1180102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607012" comment="permissions-20181116-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273426" comment="permissions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607013" comment="permissions-zypp-plugin-20181116-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273427" comment="permissions-zypp-plugin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3688</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3688" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149108">SUSE bug 1149108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603890" comment="permissions-20181116-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273426" comment="permissions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603891" comment="permissions-zypp-plugin-20181116-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273427" comment="permissions-zypp-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603742" comment="squid-4.9-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3689</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3689" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2776-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192776-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html" source="SUSE-SU"/>
    <description>
    The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603424" comment="nfs-client-2.1.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009269093" comment="nfs-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603425" comment="nfs-doc-2.1.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009269094" comment="nfs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603426" comment="nfs-kernel-server-2.1.1-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009269095" comment="nfs-kernel-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3690</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html" source="SUSE-SU"/>
    <description>
    The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<bugzilla href="https://bugzilla.suse.com/1148336">SUSE bug 1148336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157880">SUSE bug 1157880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603890" comment="permissions-20181116-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273426" comment="permissions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603891" comment="permissions-zypp-plugin-20181116-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273427" comment="permissions-zypp-plugin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3691</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3691" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3691" ref_url="https://www.suse.com/security/cve/CVE-2019-3691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006758.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00026.html" source="SUSE-SU"/>
    <description>
    A Symbolic Link (Symlink) Following vulnerability in the packaging of munge in SUSE Linux Enterprise Server 15; openSUSE Factory allowed local attackers to escalate privileges from user munge to root. This issue affects: SUSE Linux Enterprise Server 15 munge versions prior to 0.5.13-4.3.1. openSUSE Factory munge versions prior to 0.5.13-6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3691/">CVE-2019-3691</cve>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155075">SUSE bug 1155075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603879" comment="libmunge2-0.5.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273428" comment="libmunge2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603880" comment="libmunge2-32bit-0.5.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273429" comment="libmunge2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603881" comment="munge-0.5.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273430" comment="munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603882" comment="munge-devel-0.5.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273431" comment="munge-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603883" comment="munge-devel-32bit-0.5.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273432" comment="munge-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3692</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3692" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3692" ref_url="https://www.suse.com/security/cve/CVE-2019-3692" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00028.html" source="SUSE-SU"/>
    <description>
    The packaging of inn on SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local attackers to escalate from user inn to root via symlink attacks. This issue affects: SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE Factory inn version 2.6.2-2.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.2.47 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3692/">CVE-2019-3692</cve>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154302">SUSE bug 1154302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606905" comment="inn-2.5.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278741" comment="inn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606906" comment="inn-devel-2.5.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278742" comment="inn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606907" comment="mininews-2.5.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278743" comment="mininews is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3693</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3693" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00000.html" source="SUSE-SU"/>
    <description>
    A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605284" comment="mailman-2.1.29-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151563" comment="mailman is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3695" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3695" ref_url="https://www.suse.com/security/cve/CVE-2019-3695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00017.html" source="SUSE-SU"/>
    <description>
    A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3695/">CVE-2019-3695</cve>
	<bugzilla href="https://bugzilla.suse.com/1152533">SUSE bug 1152533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152763">SUSE bug 1152763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606524" comment="libpcp-devel-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278440" comment="libpcp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606525" comment="libpcp3-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278441" comment="libpcp3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606526" comment="libpcp_gui2-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278442" comment="libpcp_gui2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606527" comment="libpcp_import1-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278443" comment="libpcp_import1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606528" comment="libpcp_mmv1-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278444" comment="libpcp_mmv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606529" comment="libpcp_trace2-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278445" comment="libpcp_trace2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606530" comment="libpcp_web1-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278446" comment="libpcp_web1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606531" comment="pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278447" comment="pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606532" comment="pcp-conf-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278448" comment="pcp-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606533" comment="pcp-devel-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278449" comment="pcp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606534" comment="pcp-doc-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278450" comment="pcp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606535" comment="pcp-export-pcp2elasticsearch-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278451" comment="pcp-export-pcp2elasticsearch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606536" comment="pcp-export-pcp2graphite-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278452" comment="pcp-export-pcp2graphite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606537" comment="pcp-export-pcp2influxdb-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278453" comment="pcp-export-pcp2influxdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606538" comment="pcp-export-pcp2json-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278454" comment="pcp-export-pcp2json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606539" comment="pcp-export-pcp2spark-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278455" comment="pcp-export-pcp2spark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606540" comment="pcp-export-pcp2xml-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278456" comment="pcp-export-pcp2xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606541" comment="pcp-export-pcp2zabbix-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278457" comment="pcp-export-pcp2zabbix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606542" comment="pcp-export-zabbix-agent-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278458" comment="pcp-export-zabbix-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606543" comment="pcp-gui-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278459" comment="pcp-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606544" comment="pcp-import-collectl2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278460" comment="pcp-import-collectl2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606545" comment="pcp-import-ganglia2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278461" comment="pcp-import-ganglia2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606546" comment="pcp-import-iostat2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278462" comment="pcp-import-iostat2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606547" comment="pcp-import-mrtg2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278463" comment="pcp-import-mrtg2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606548" comment="pcp-import-sar2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278464" comment="pcp-import-sar2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606549" comment="pcp-manager-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278465" comment="pcp-manager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606550" comment="pcp-pmda-activemq-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278466" comment="pcp-pmda-activemq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606551" comment="pcp-pmda-apache-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278467" comment="pcp-pmda-apache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606552" comment="pcp-pmda-bash-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278468" comment="pcp-pmda-bash is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606553" comment="pcp-pmda-bind2-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278469" comment="pcp-pmda-bind2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606554" comment="pcp-pmda-bonding-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278470" comment="pcp-pmda-bonding is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606555" comment="pcp-pmda-cifs-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278471" comment="pcp-pmda-cifs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606556" comment="pcp-pmda-cisco-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278472" comment="pcp-pmda-cisco is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606557" comment="pcp-pmda-dbping-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278473" comment="pcp-pmda-dbping is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606558" comment="pcp-pmda-dm-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278474" comment="pcp-pmda-dm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606559" comment="pcp-pmda-docker-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278475" comment="pcp-pmda-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606560" comment="pcp-pmda-ds389-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278476" comment="pcp-pmda-ds389 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606561" comment="pcp-pmda-ds389log-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278477" comment="pcp-pmda-ds389log is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606562" comment="pcp-pmda-elasticsearch-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278478" comment="pcp-pmda-elasticsearch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606563" comment="pcp-pmda-gfs2-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278479" comment="pcp-pmda-gfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606564" comment="pcp-pmda-gluster-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278480" comment="pcp-pmda-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606565" comment="pcp-pmda-gpfs-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278481" comment="pcp-pmda-gpfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606566" comment="pcp-pmda-gpsd-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278482" comment="pcp-pmda-gpsd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606567" comment="pcp-pmda-haproxy-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278483" comment="pcp-pmda-haproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606568" comment="pcp-pmda-infiniband-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278484" comment="pcp-pmda-infiniband is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606569" comment="pcp-pmda-json-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278485" comment="pcp-pmda-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606570" comment="pcp-pmda-lmsensors-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278486" comment="pcp-pmda-lmsensors is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606571" comment="pcp-pmda-logger-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278487" comment="pcp-pmda-logger is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606572" comment="pcp-pmda-lustre-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278488" comment="pcp-pmda-lustre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606573" comment="pcp-pmda-lustrecomm-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278489" comment="pcp-pmda-lustrecomm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606574" comment="pcp-pmda-mailq-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278490" comment="pcp-pmda-mailq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606575" comment="pcp-pmda-memcache-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278491" comment="pcp-pmda-memcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606576" comment="pcp-pmda-mic-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278492" comment="pcp-pmda-mic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606577" comment="pcp-pmda-mounts-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278493" comment="pcp-pmda-mounts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606578" comment="pcp-pmda-mysql-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278494" comment="pcp-pmda-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606579" comment="pcp-pmda-named-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278495" comment="pcp-pmda-named is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606580" comment="pcp-pmda-netfilter-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278496" comment="pcp-pmda-netfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606581" comment="pcp-pmda-news-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278497" comment="pcp-pmda-news is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606582" comment="pcp-pmda-nfsclient-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278498" comment="pcp-pmda-nfsclient is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606583" comment="pcp-pmda-nginx-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278499" comment="pcp-pmda-nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606584" comment="pcp-pmda-nutcracker-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278500" comment="pcp-pmda-nutcracker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606585" comment="pcp-pmda-nvidia-gpu-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278501" comment="pcp-pmda-nvidia-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606586" comment="pcp-pmda-oracle-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278502" comment="pcp-pmda-oracle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606587" comment="pcp-pmda-papi-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278503" comment="pcp-pmda-papi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606588" comment="pcp-pmda-pdns-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278504" comment="pcp-pmda-pdns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606589" comment="pcp-pmda-perfevent-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278505" comment="pcp-pmda-perfevent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606590" comment="pcp-pmda-postfix-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278506" comment="pcp-pmda-postfix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606591" comment="pcp-pmda-prometheus-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278507" comment="pcp-pmda-prometheus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606592" comment="pcp-pmda-redis-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278508" comment="pcp-pmda-redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606593" comment="pcp-pmda-roomtemp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278509" comment="pcp-pmda-roomtemp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606594" comment="pcp-pmda-rpm-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278510" comment="pcp-pmda-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606595" comment="pcp-pmda-rsyslog-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278511" comment="pcp-pmda-rsyslog is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606596" comment="pcp-pmda-samba-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278512" comment="pcp-pmda-samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606597" comment="pcp-pmda-sendmail-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278513" comment="pcp-pmda-sendmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606598" comment="pcp-pmda-shping-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278514" comment="pcp-pmda-shping is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606599" comment="pcp-pmda-slurm-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278515" comment="pcp-pmda-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606600" comment="pcp-pmda-smart-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278516" comment="pcp-pmda-smart is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606601" comment="pcp-pmda-snmp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278517" comment="pcp-pmda-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606602" comment="pcp-pmda-summary-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278518" comment="pcp-pmda-summary is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606603" comment="pcp-pmda-systemd-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278519" comment="pcp-pmda-systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606604" comment="pcp-pmda-trace-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278520" comment="pcp-pmda-trace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606605" comment="pcp-pmda-unbound-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278521" comment="pcp-pmda-unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606606" comment="pcp-pmda-vmware-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278522" comment="pcp-pmda-vmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606607" comment="pcp-pmda-weblog-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278523" comment="pcp-pmda-weblog is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606608" comment="pcp-pmda-zimbra-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278524" comment="pcp-pmda-zimbra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606609" comment="pcp-pmda-zswap-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278525" comment="pcp-pmda-zswap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606610" comment="pcp-system-tools-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278526" comment="pcp-system-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606611" comment="pcp-testsuite-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278527" comment="pcp-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606612" comment="pcp-webapi-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278528" comment="pcp-webapi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606613" comment="pcp-zeroconf-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278529" comment="pcp-zeroconf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606614" comment="perl-PCP-LogImport-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278530" comment="perl-PCP-LogImport is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606615" comment="perl-PCP-LogSummary-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278531" comment="perl-PCP-LogSummary is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606616" comment="perl-PCP-MMV-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278532" comment="perl-PCP-MMV is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606617" comment="perl-PCP-PMDA-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278533" comment="perl-PCP-PMDA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606618" comment="python3-pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278534" comment="python3-pcp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3696" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3696" ref_url="https://www.suse.com/security/cve/CVE-2019-3696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00017.html" source="SUSE-SU"/>
    <description>
    A Improper Limitation of a Pathname to a Restricted Directory vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local user pcp to overwrite arbitrary files with arbitrary content. This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3696/">CVE-2019-3696</cve>
	<bugzilla href="https://bugzilla.suse.com/1152533">SUSE bug 1152533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153921">SUSE bug 1153921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606524" comment="libpcp-devel-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278440" comment="libpcp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606525" comment="libpcp3-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278441" comment="libpcp3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606526" comment="libpcp_gui2-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278442" comment="libpcp_gui2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606527" comment="libpcp_import1-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278443" comment="libpcp_import1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606528" comment="libpcp_mmv1-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278444" comment="libpcp_mmv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606529" comment="libpcp_trace2-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278445" comment="libpcp_trace2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606530" comment="libpcp_web1-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278446" comment="libpcp_web1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606531" comment="pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278447" comment="pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606532" comment="pcp-conf-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278448" comment="pcp-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606533" comment="pcp-devel-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278449" comment="pcp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606534" comment="pcp-doc-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278450" comment="pcp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606535" comment="pcp-export-pcp2elasticsearch-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278451" comment="pcp-export-pcp2elasticsearch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606536" comment="pcp-export-pcp2graphite-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278452" comment="pcp-export-pcp2graphite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606537" comment="pcp-export-pcp2influxdb-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278453" comment="pcp-export-pcp2influxdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606538" comment="pcp-export-pcp2json-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278454" comment="pcp-export-pcp2json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606539" comment="pcp-export-pcp2spark-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278455" comment="pcp-export-pcp2spark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606540" comment="pcp-export-pcp2xml-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278456" comment="pcp-export-pcp2xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606541" comment="pcp-export-pcp2zabbix-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278457" comment="pcp-export-pcp2zabbix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606542" comment="pcp-export-zabbix-agent-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278458" comment="pcp-export-zabbix-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606543" comment="pcp-gui-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278459" comment="pcp-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606544" comment="pcp-import-collectl2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278460" comment="pcp-import-collectl2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606545" comment="pcp-import-ganglia2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278461" comment="pcp-import-ganglia2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606546" comment="pcp-import-iostat2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278462" comment="pcp-import-iostat2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606547" comment="pcp-import-mrtg2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278463" comment="pcp-import-mrtg2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606548" comment="pcp-import-sar2pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278464" comment="pcp-import-sar2pcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606549" comment="pcp-manager-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278465" comment="pcp-manager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606550" comment="pcp-pmda-activemq-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278466" comment="pcp-pmda-activemq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606551" comment="pcp-pmda-apache-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278467" comment="pcp-pmda-apache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606552" comment="pcp-pmda-bash-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278468" comment="pcp-pmda-bash is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606553" comment="pcp-pmda-bind2-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278469" comment="pcp-pmda-bind2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606554" comment="pcp-pmda-bonding-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278470" comment="pcp-pmda-bonding is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606555" comment="pcp-pmda-cifs-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278471" comment="pcp-pmda-cifs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606556" comment="pcp-pmda-cisco-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278472" comment="pcp-pmda-cisco is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606557" comment="pcp-pmda-dbping-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278473" comment="pcp-pmda-dbping is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606558" comment="pcp-pmda-dm-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278474" comment="pcp-pmda-dm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606559" comment="pcp-pmda-docker-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278475" comment="pcp-pmda-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606560" comment="pcp-pmda-ds389-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278476" comment="pcp-pmda-ds389 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606561" comment="pcp-pmda-ds389log-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278477" comment="pcp-pmda-ds389log is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606562" comment="pcp-pmda-elasticsearch-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278478" comment="pcp-pmda-elasticsearch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606563" comment="pcp-pmda-gfs2-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278479" comment="pcp-pmda-gfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606564" comment="pcp-pmda-gluster-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278480" comment="pcp-pmda-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606565" comment="pcp-pmda-gpfs-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278481" comment="pcp-pmda-gpfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606566" comment="pcp-pmda-gpsd-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278482" comment="pcp-pmda-gpsd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606567" comment="pcp-pmda-haproxy-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278483" comment="pcp-pmda-haproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606568" comment="pcp-pmda-infiniband-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278484" comment="pcp-pmda-infiniband is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606569" comment="pcp-pmda-json-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278485" comment="pcp-pmda-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606570" comment="pcp-pmda-lmsensors-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278486" comment="pcp-pmda-lmsensors is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606571" comment="pcp-pmda-logger-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278487" comment="pcp-pmda-logger is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606572" comment="pcp-pmda-lustre-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278488" comment="pcp-pmda-lustre is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606573" comment="pcp-pmda-lustrecomm-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278489" comment="pcp-pmda-lustrecomm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606574" comment="pcp-pmda-mailq-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278490" comment="pcp-pmda-mailq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606575" comment="pcp-pmda-memcache-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278491" comment="pcp-pmda-memcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606576" comment="pcp-pmda-mic-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278492" comment="pcp-pmda-mic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606577" comment="pcp-pmda-mounts-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278493" comment="pcp-pmda-mounts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606578" comment="pcp-pmda-mysql-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278494" comment="pcp-pmda-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606579" comment="pcp-pmda-named-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278495" comment="pcp-pmda-named is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606580" comment="pcp-pmda-netfilter-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278496" comment="pcp-pmda-netfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606581" comment="pcp-pmda-news-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278497" comment="pcp-pmda-news is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606582" comment="pcp-pmda-nfsclient-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278498" comment="pcp-pmda-nfsclient is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606583" comment="pcp-pmda-nginx-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278499" comment="pcp-pmda-nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606584" comment="pcp-pmda-nutcracker-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278500" comment="pcp-pmda-nutcracker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606585" comment="pcp-pmda-nvidia-gpu-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278501" comment="pcp-pmda-nvidia-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606586" comment="pcp-pmda-oracle-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278502" comment="pcp-pmda-oracle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606587" comment="pcp-pmda-papi-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278503" comment="pcp-pmda-papi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606588" comment="pcp-pmda-pdns-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278504" comment="pcp-pmda-pdns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606589" comment="pcp-pmda-perfevent-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278505" comment="pcp-pmda-perfevent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606590" comment="pcp-pmda-postfix-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278506" comment="pcp-pmda-postfix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606591" comment="pcp-pmda-prometheus-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278507" comment="pcp-pmda-prometheus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606592" comment="pcp-pmda-redis-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278508" comment="pcp-pmda-redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606593" comment="pcp-pmda-roomtemp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278509" comment="pcp-pmda-roomtemp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606594" comment="pcp-pmda-rpm-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278510" comment="pcp-pmda-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606595" comment="pcp-pmda-rsyslog-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278511" comment="pcp-pmda-rsyslog is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606596" comment="pcp-pmda-samba-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278512" comment="pcp-pmda-samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606597" comment="pcp-pmda-sendmail-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278513" comment="pcp-pmda-sendmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606598" comment="pcp-pmda-shping-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278514" comment="pcp-pmda-shping is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606599" comment="pcp-pmda-slurm-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278515" comment="pcp-pmda-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606600" comment="pcp-pmda-smart-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278516" comment="pcp-pmda-smart is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606601" comment="pcp-pmda-snmp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278517" comment="pcp-pmda-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606602" comment="pcp-pmda-summary-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278518" comment="pcp-pmda-summary is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606603" comment="pcp-pmda-systemd-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278519" comment="pcp-pmda-systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606604" comment="pcp-pmda-trace-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278520" comment="pcp-pmda-trace is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606605" comment="pcp-pmda-unbound-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278521" comment="pcp-pmda-unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606606" comment="pcp-pmda-vmware-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278522" comment="pcp-pmda-vmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606607" comment="pcp-pmda-weblog-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278523" comment="pcp-pmda-weblog is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606608" comment="pcp-pmda-zimbra-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278524" comment="pcp-pmda-zimbra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606609" comment="pcp-pmda-zswap-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278525" comment="pcp-pmda-zswap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606610" comment="pcp-system-tools-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278526" comment="pcp-system-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606611" comment="pcp-testsuite-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278527" comment="pcp-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606612" comment="pcp-webapi-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278528" comment="pcp-webapi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606613" comment="pcp-zeroconf-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278529" comment="pcp-zeroconf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606614" comment="perl-PCP-LogImport-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278530" comment="perl-PCP-LogImport is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606615" comment="perl-PCP-LogSummary-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278531" comment="perl-PCP-LogSummary is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606616" comment="perl-PCP-MMV-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278532" comment="perl-PCP-MMV is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606617" comment="perl-PCP-PMDA-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278533" comment="perl-PCP-PMDA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606618" comment="python3-pcp-4.3.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278534" comment="python3-pcp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3698</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3698" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3698" ref_url="https://www.suse.com/security/cve/CVE-2019-3698" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html" source="SUSE-SU"/>
    <description>
    UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local attackers to cause cause DoS or potentially escalate privileges by winning a race. This issue affects: SUSE Linux Enterprise Server 12 nagios version 3.5.1-5.27 and prior versions. SUSE Linux Enterprise Server 11 nagios version 3.0.6-1.25.36.3.1 and prior versions. openSUSE Factory nagios version 4.4.5-2.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3698/">CVE-2019-3698</cve>
	<bugzilla href="https://bugzilla.suse.com/1150550">SUSE bug 1150550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156309">SUSE bug 1156309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607477" comment="nagios-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151576" comment="nagios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607478" comment="nagios-contrib-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281477" comment="nagios-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607479" comment="nagios-devel-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281478" comment="nagios-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607480" comment="nagios-theme-exfoliation-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281479" comment="nagios-theme-exfoliation is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607481" comment="nagios-www-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151577" comment="nagios-www is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607482" comment="nagios-www-dch-4.4.5-lp151.5.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281480" comment="nagios-www-dch is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3701</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3701" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701</cve>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607559" comment="kernel-debug-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607560" comment="kernel-debug-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607561" comment="kernel-debug-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607562" comment="kernel-default-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607563" comment="kernel-default-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607564" comment="kernel-default-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607565" comment="kernel-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607566" comment="kernel-docs-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607567" comment="kernel-docs-html-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607568" comment="kernel-kvmsmall-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607571" comment="kernel-macros-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607572" comment="kernel-obs-build-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607573" comment="kernel-obs-qa-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607574" comment="kernel-source-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607575" comment="kernel-source-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607576" comment="kernel-syms-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607577" comment="kernel-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607578" comment="kernel-vanilla-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607579" comment="kernel-vanilla-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3820</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00049.html" source="SUSE-SU"/>
    <description>
    It was discovered that the gnome-shell lock screen since version 3.15.91 did not properly restrict all contextual actions. An attacker with physical access to a locked workstation could invoke certain keyboard shortcuts, and potentially other actions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820</cve>
	<bugzilla href="https://bugzilla.suse.com/1124493">SUSE bug 1124493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601526" comment="gnome-shell-3.26.2+20180130.0d9c74212-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151510" comment="gnome-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601527" comment="gnome-shell-browser-plugin-3.26.2+20180130.0d9c74212-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151511" comment="gnome-shell-browser-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601528" comment="gnome-shell-calendar-3.26.2+20180130.0d9c74212-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151512" comment="gnome-shell-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601529" comment="gnome-shell-devel-3.26.2+20180130.0d9c74212-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162388" comment="gnome-shell-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601530" comment="gnome-shell-lang-3.26.2+20180130.0d9c74212-lp151.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151513" comment="gnome-shell-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3828</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3828" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html" source="SUSE-SU"/>
    <description>
    Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828</cve>
	<bugzilla href="https://bugzilla.suse.com/1126503">SUSE bug 1126503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164137">SUSE bug 1164137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609654" comment="ansible-2.8.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166857" comment="ansible is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3835</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603086" comment="ghostscript-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603087" comment="ghostscript-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603088" comment="ghostscript-mini-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603089" comment="ghostscript-mini-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603090" comment="ghostscript-x11-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3839</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3839" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.27 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839</cve>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603086" comment="ghostscript-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603087" comment="ghostscript-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603088" comment="ghostscript-mini-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603089" comment="ghostscript-mini-devel-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603090" comment="ghostscript-x11-9.27-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156330">SUSE bug 1156330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601448" comment="kernel-debug-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601449" comment="kernel-debug-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601450" comment="kernel-debug-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601451" comment="kernel-default-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601452" comment="kernel-default-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601453" comment="kernel-default-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601454" comment="kernel-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601455" comment="kernel-docs-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601456" comment="kernel-docs-html-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601457" comment="kernel-kvmsmall-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601458" comment="kernel-kvmsmall-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601459" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601460" comment="kernel-macros-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601461" comment="kernel-obs-build-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601462" comment="kernel-obs-qa-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601463" comment="kernel-source-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601464" comment="kernel-source-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601465" comment="kernel-syms-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601466" comment="kernel-vanilla-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601467" comment="kernel-vanilla-base-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601468" comment="kernel-vanilla-devel-4.12.14-lp151.28.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3855</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134329">SUSE bug 1134329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141850">SUSE bug 1141850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3856</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3857</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3858</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3858" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3859</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3860</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3861</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3861" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3862" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606515" comment="libssh2-1-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606516" comment="libssh2-1-32bit-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153297" comment="libssh2-1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606517" comment="libssh2-devel-1.9.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153298" comment="libssh2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3881</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3881" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3881" ref_url="https://www.suse.com/security/cve/CVE-2019-3881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1582-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00051.html" source="SUSE-SU"/>
    <description>
    Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3881/">CVE-2019-3881</cve>
	<bugzilla href="https://bugzilla.suse.com/1143436">SUSE bug 1143436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608573" comment="ruby2.5-rubygem-bundler-1.16.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285430" comment="ruby2.5-rubygem-bundler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608574" comment="ruby2.5-rubygem-bundler-doc-1.16.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285431" comment="ruby2.5-rubygem-bundler-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3882</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3902</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3902" ref_url="https://www.suse.com/security/cve/CVE-2019-3902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1709-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00057.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to defeat Mercurial's path-checking logic and write files outside a repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3902/">CVE-2019-3902</cve>
	<bugzilla href="https://bugzilla.suse.com/1133035">SUSE bug 1133035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609050" comment="mercurial-4.5.2-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153633" comment="mercurial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609051" comment="mercurial-lang-4.5.2-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153634" comment="mercurial-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
    <description>
    hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008</cve>
	<bugzilla href="https://bugzilla.suse.com/1133031">SUSE bug 1133031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602543" comment="qemu-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602544" comment="qemu-arm-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602545" comment="qemu-audio-alsa-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602546" comment="qemu-audio-oss-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602547" comment="qemu-audio-pa-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602548" comment="qemu-audio-sdl-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602549" comment="qemu-block-curl-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602550" comment="qemu-block-dmg-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602551" comment="qemu-block-gluster-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602552" comment="qemu-block-iscsi-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602553" comment="qemu-block-nfs-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602554" comment="qemu-block-rbd-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602555" comment="qemu-block-ssh-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602556" comment="qemu-extra-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602557" comment="qemu-guest-agent-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602558" comment="qemu-ipxe-1.0.0+-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602559" comment="qemu-ksm-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602560" comment="qemu-kvm-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602561" comment="qemu-lang-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602562" comment="qemu-linux-user-3.1.1-lp151.7.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602563" comment="qemu-ppc-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602564" comment="qemu-s390-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602565" comment="qemu-seabios-1.12.0-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602566" comment="qemu-sgabios-8-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602567" comment="qemu-testsuite-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153020" comment="qemu-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602568" comment="qemu-tools-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602569" comment="qemu-ui-curses-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602570" comment="qemu-ui-gtk-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602571" comment="qemu-ui-sdl-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602572" comment="qemu-vgabios-1.12.0-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602573" comment="qemu-x86-3.1.1-lp151.7.3.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5010</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606883" comment="libpython3_6m1_0-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606884" comment="libpython3_6m1_0-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606885" comment="python3-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606886" comment="python3-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606887" comment="python3-base-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606888" comment="python3-base-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606889" comment="python3-curses-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606890" comment="python3-dbm-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606891" comment="python3-devel-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606892" comment="python3-doc-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606893" comment="python3-doc-devhelp-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606894" comment="python3-idle-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606895" comment="python3-testsuite-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606896" comment="python3-tk-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606897" comment="python3-tools-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5021</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5021" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5021" ref_url="https://www.suse.com/security/cve/CVE-2019-5021" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1368-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00004.html" source="SUSE-SU"/>
    <description>
    Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015. Due to the nature of this issue, systems deployed using affected versions of the Alpine Linux container which utilize Linux PAM, or some other mechanism which uses the system shadow file as an authentication database, may accept a NULL password for the `root` user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5021/">CVE-2019-5021</cve>
	<bugzilla href="https://bugzilla.suse.com/1134524">SUSE bug 1134524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137143">SUSE bug 1137143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193577">SUSE bug 1193577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601391" comment="system-user-root-20190513-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256071" comment="system-user-root is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5051</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5051" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5051" ref_url="https://www.suse.com/security/cve/CVE-2019-5051" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
    <description>
    An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5051/">CVE-2019-5051</cve>
	<bugzilla href="https://bugzilla.suse.com/1140419">SUSE bug 1140419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5052</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5052" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5052" ref_url="https://www.suse.com/security/cve/CVE-2019-5052" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" source="SUSE-SU"/>
    <description>
    An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5052/">CVE-2019-5052</cve>
	<bugzilla href="https://bugzilla.suse.com/1140421">SUSE bug 1140421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602646" comment="libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172250" comment="libSDL_image-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602647" comment="libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172251" comment="libSDL_image-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602648" comment="libSDL_image-devel-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172252" comment="libSDL_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602649" comment="libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172253" comment="libSDL_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5057</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5057" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5057" ref_url="https://www.suse.com/security/cve/CVE-2019-5057" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the PCX image-rendering functionality of SDL2_image 2.0.4. A specially crafted PCX image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5057/">CVE-2019-5057</cve>
	<bugzilla href="https://bugzilla.suse.com/1143763">SUSE bug 1143763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602646" comment="libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172250" comment="libSDL_image-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602647" comment="libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172251" comment="libSDL_image-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602648" comment="libSDL_image-devel-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172252" comment="libSDL_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602649" comment="libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172253" comment="libSDL_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5058</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5058" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5058" ref_url="https://www.suse.com/security/cve/CVE-2019-5058" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image 2.0.4. A specially crafted XCF image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5058/">CVE-2019-5058</cve>
	<bugzilla href="https://bugzilla.suse.com/1143764">SUSE bug 1143764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602646" comment="libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172250" comment="libSDL_image-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602647" comment="libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172251" comment="libSDL_image-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602648" comment="libSDL_image-devel-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172252" comment="libSDL_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602649" comment="libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172253" comment="libSDL_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5059</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5059" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5059" ref_url="https://www.suse.com/security/cve/CVE-2019-5059" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5059/">CVE-2019-5059</cve>
	<bugzilla href="https://bugzilla.suse.com/1143766">SUSE bug 1143766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602646" comment="libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172250" comment="libSDL_image-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602647" comment="libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172251" comment="libSDL_image-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602648" comment="libSDL_image-devel-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172252" comment="libSDL_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602649" comment="libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172253" comment="libSDL_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5060</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5060" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5060" ref_url="https://www.suse.com/security/cve/CVE-2019-5060" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the XPM image rendering function of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow in the colorhash function, allocating too small of a buffer. This buffer can then be written out of bounds, resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5060/">CVE-2019-5060</cve>
	<bugzilla href="https://bugzilla.suse.com/1143768">SUSE bug 1143768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602642" comment="libSDL2_image-2_0-0-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172246" comment="libSDL2_image-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602643" comment="libSDL2_image-2_0-0-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172247" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602644" comment="libSDL2_image-devel-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172248" comment="libSDL2_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602645" comment="libSDL2_image-devel-32bit-2.0.5-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172249" comment="libSDL2_image-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602646" comment="libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172250" comment="libSDL_image-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602647" comment="libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172251" comment="libSDL_image-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602648" comment="libSDL_image-devel-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172252" comment="libSDL_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602649" comment="libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172253" comment="libSDL_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0111-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html" source="SUSE-SU"/>
    <description>
    An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608847" comment="Mesa-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276538" comment="Mesa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608848" comment="Mesa-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276539" comment="Mesa-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608849" comment="Mesa-KHR-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276540" comment="Mesa-KHR-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608850" comment="Mesa-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276541" comment="Mesa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608851" comment="Mesa-dri-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276542" comment="Mesa-dri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608852" comment="Mesa-dri-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276543" comment="Mesa-dri-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608853" comment="Mesa-dri-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276544" comment="Mesa-dri-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608854" comment="Mesa-dri-nouveau-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276545" comment="Mesa-dri-nouveau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608855" comment="Mesa-dri-nouveau-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276546" comment="Mesa-dri-nouveau-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608856" comment="Mesa-gallium-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276548" comment="Mesa-gallium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608857" comment="Mesa-gallium-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276549" comment="Mesa-gallium-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608858" comment="Mesa-libEGL-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276550" comment="Mesa-libEGL-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608859" comment="Mesa-libEGL1-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276551" comment="Mesa-libEGL1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608860" comment="Mesa-libEGL1-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276552" comment="Mesa-libEGL1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608861" comment="Mesa-libGL-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276553" comment="Mesa-libGL-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608862" comment="Mesa-libGL1-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276554" comment="Mesa-libGL1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608863" comment="Mesa-libGL1-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276555" comment="Mesa-libGL1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608864" comment="Mesa-libGLESv1_CM-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276556" comment="Mesa-libGLESv1_CM-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608865" comment="Mesa-libGLESv1_CM1-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276557" comment="Mesa-libGLESv1_CM1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608866" comment="Mesa-libGLESv2-2-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276558" comment="Mesa-libGLESv2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608867" comment="Mesa-libGLESv2-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276559" comment="Mesa-libGLESv2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608868" comment="Mesa-libGLESv3-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276560" comment="Mesa-libGLESv3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608869" comment="Mesa-libOpenCL-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276561" comment="Mesa-libOpenCL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608870" comment="Mesa-libVulkan-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276562" comment="Mesa-libVulkan-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608871" comment="Mesa-libd3d-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276563" comment="Mesa-libd3d is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608872" comment="Mesa-libd3d-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276564" comment="Mesa-libd3d-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608873" comment="Mesa-libd3d-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276565" comment="Mesa-libd3d-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608874" comment="Mesa-libd3d-devel-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276566" comment="Mesa-libd3d-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608875" comment="Mesa-libglapi-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276567" comment="Mesa-libglapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608876" comment="Mesa-libglapi-devel-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276568" comment="Mesa-libglapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608877" comment="Mesa-libglapi0-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276569" comment="Mesa-libglapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608878" comment="Mesa-libglapi0-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276570" comment="Mesa-libglapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608879" comment="Mesa-libva-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276571" comment="Mesa-libva is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608880" comment="libOSMesa-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276572" comment="libOSMesa-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608881" comment="libOSMesa-devel-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276573" comment="libOSMesa-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608882" comment="libOSMesa8-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276574" comment="libOSMesa8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608883" comment="libOSMesa8-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276575" comment="libOSMesa8-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608884" comment="libXvMC_nouveau-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276576" comment="libXvMC_nouveau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608885" comment="libXvMC_nouveau-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276577" comment="libXvMC_nouveau-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608886" comment="libXvMC_r600-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276578" comment="libXvMC_r600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608887" comment="libXvMC_r600-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276579" comment="libXvMC_r600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608888" comment="libgbm-devel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276580" comment="libgbm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608889" comment="libgbm-devel-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276581" comment="libgbm-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608890" comment="libgbm1-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276582" comment="libgbm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608891" comment="libgbm1-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276583" comment="libgbm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608892" comment="libvdpau_nouveau-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276584" comment="libvdpau_nouveau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608893" comment="libvdpau_nouveau-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276585" comment="libvdpau_nouveau-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608894" comment="libvdpau_r300-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276586" comment="libvdpau_r300 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608895" comment="libvdpau_r300-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276587" comment="libvdpau_r300-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608896" comment="libvdpau_r600-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276588" comment="libvdpau_r600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608897" comment="libvdpau_r600-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276589" comment="libvdpau_r600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608898" comment="libvdpau_radeonsi-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276590" comment="libvdpau_radeonsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608899" comment="libvdpau_radeonsi-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276591" comment="libvdpau_radeonsi-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608900" comment="libvulkan_intel-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276592" comment="libvulkan_intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608901" comment="libvulkan_intel-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276593" comment="libvulkan_intel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608902" comment="libvulkan_radeon-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276594" comment="libvulkan_radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608903" comment="libvulkan_radeon-32bit-18.3.2-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276595" comment="libvulkan_radeon-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608904" comment="libxatracker-devel-1.0.0-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276596" comment="libxatracker-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608905" comment="libxatracker2-1.0.0-lp151.23.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276597" comment="libxatracker2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5094</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094</cve>
	<bugzilla href="https://bugzilla.suse.com/1152101">SUSE bug 1152101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609803" comment="e2fsprogs-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152602" comment="e2fsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609804" comment="e2fsprogs-devel-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152603" comment="e2fsprogs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609805" comment="libcom_err-devel-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152604" comment="libcom_err-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609806" comment="libcom_err-devel-32bit-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231065" comment="libcom_err-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609807" comment="libcom_err-devel-static-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231066" comment="libcom_err-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609808" comment="libcom_err2-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152605" comment="libcom_err2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609809" comment="libcom_err2-32bit-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152606" comment="libcom_err2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609810" comment="libext2fs-devel-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152607" comment="libext2fs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609811" comment="libext2fs-devel-32bit-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231067" comment="libext2fs-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609812" comment="libext2fs-devel-static-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231068" comment="libext2fs-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609813" comment="libext2fs2-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152608" comment="libext2fs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609814" comment="libext2fs2-32bit-1.43.8-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231069" comment="libext2fs2-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5163</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5163" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5163" ref_url="https://www.suse.com/security/cve/CVE-2019-5163" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" source="SUSE-SU"/>
    <description>
    An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5163/">CVE-2019-5163</cve>
	<bugzilla href="https://bugzilla.suse.com/1158251">SUSE bug 1158251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603869" comment="libshadowsocks-libev2-3.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273433" comment="libshadowsocks-libev2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603870" comment="shadowsocks-libev-3.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166964" comment="shadowsocks-libev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603871" comment="shadowsocks-libev-devel-3.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166965" comment="shadowsocks-libev-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603872" comment="shadowsocks-libev-doc-3.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166966" comment="shadowsocks-libev-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5164" ref_url="https://www.suse.com/security/cve/CVE-2019-5164" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5164/">CVE-2019-5164</cve>
	<bugzilla href="https://bugzilla.suse.com/1158365">SUSE bug 1158365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603869" comment="libshadowsocks-libev2-3.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273433" comment="libshadowsocks-libev2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603870" comment="shadowsocks-libev-3.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166964" comment="shadowsocks-libev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603871" comment="shadowsocks-libev-devel-3.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166965" comment="shadowsocks-libev-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603872" comment="shadowsocks-libev-doc-3.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166966" comment="shadowsocks-libev-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5188</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006471.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188</cve>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605533" comment="e2fsprogs-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152602" comment="e2fsprogs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605534" comment="e2fsprogs-devel-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152603" comment="e2fsprogs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605535" comment="libcom_err-devel-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152604" comment="libcom_err-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605536" comment="libcom_err-devel-32bit-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231065" comment="libcom_err-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605537" comment="libcom_err-devel-static-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231066" comment="libcom_err-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605538" comment="libcom_err2-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152605" comment="libcom_err2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605539" comment="libcom_err2-32bit-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152606" comment="libcom_err2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605540" comment="libext2fs-devel-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152607" comment="libext2fs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605541" comment="libext2fs-devel-32bit-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231067" comment="libext2fs-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605542" comment="libext2fs-devel-static-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231068" comment="libext2fs-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605543" comment="libext2fs2-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152608" comment="libext2fs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605544" comment="libext2fs2-32bit-1.43.8-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231069" comment="libext2fs2-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5418</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5418" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0915-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190915-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    There is a File Content Disclosure vulnerability in Action View &lt;5.2.2.1, &lt;5.1.6.2, &lt;5.0.7.2, &lt;4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418</cve>
	<bugzilla href="https://bugzilla.suse.com/1129272">SUSE bug 1129272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5419</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5419" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0915-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190915-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    There is a possible denial of service vulnerability in Action View (Rails) &lt;5.2.2.1, &lt;5.1.6.2, &lt;5.0.7.2, &lt;4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419</cve>
	<bugzilla href="https://bugzilla.suse.com/1129271">SUSE bug 1129271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5420</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5420" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5420" ref_url="https://www.suse.com/security/cve/CVE-2019-5420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability in development mode Rails &lt;5.2.2.1, &lt;6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5420/">CVE-2019-5420</cve>
	<bugzilla href="https://bugzilla.suse.com/1129268">SUSE bug 1129268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5436</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2009-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192009-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601397" comment="curl-7.60.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601398" comment="curl-mini-7.60.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601399" comment="libcurl-devel-7.60.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601400" comment="libcurl-devel-32bit-7.60.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601401" comment="libcurl-mini-devel-7.60.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601402" comment="libcurl4-7.60.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601403" comment="libcurl4-32bit-7.60.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601404" comment="libcurl4-mini-7.60.0-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5439</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5439" ref_url="https://www.suse.com/security/cve/CVE-2019-5439" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html" source="SUSE-SU"/>
    <description>
    A Buffer Overflow in VLC Media Player &lt; 3.0.7 causes a crash which can possibly be further developed into a remote code execution exploit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5439/">CVE-2019-5439</cve>
	<bugzilla href="https://bugzilla.suse.com/1138354">SUSE bug 1138354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602032" comment="libvlc5-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602033" comment="libvlccore9-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602034" comment="vlc-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602035" comment="vlc-codec-gstreamer-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602036" comment="vlc-devel-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602037" comment="vlc-jack-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602038" comment="vlc-lang-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602039" comment="vlc-noX-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602040" comment="vlc-qt-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602041" comment="vlc-vdpau-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5459</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5459" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5459" ref_url="https://www.suse.com/security/cve/CVE-2019-5459" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html" source="SUSE-SU"/>
    <description>
    An Integer underflow in VLC Media Player versions &lt; 3.0.7 leads to an out-of-band read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5459/">CVE-2019-5459</cve>
	<bugzilla href="https://bugzilla.suse.com/1143549">SUSE bug 1143549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602032" comment="libvlc5-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602033" comment="libvlccore9-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602034" comment="vlc-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602035" comment="vlc-codec-gstreamer-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602036" comment="vlc-devel-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602037" comment="vlc-jack-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602038" comment="vlc-lang-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602039" comment="vlc-noX-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602040" comment="vlc-qt-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602041" comment="vlc-vdpau-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5460</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5460" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5460" ref_url="https://www.suse.com/security/cve/CVE-2019-5460" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html" source="SUSE-SU"/>
    <description>
    Double Free in VLC versions &lt;= 3.0.6 leads to a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5460/">CVE-2019-5460</cve>
	<bugzilla href="https://bugzilla.suse.com/1143547">SUSE bug 1143547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602032" comment="libvlc5-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602033" comment="libvlccore9-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602034" comment="vlc-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602035" comment="vlc-codec-gstreamer-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602036" comment="vlc-devel-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602037" comment="vlc-jack-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602038" comment="vlc-lang-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602039" comment="vlc-noX-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602040" comment="vlc-qt-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602041" comment="vlc-vdpau-3.0.7.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5481</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2373-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192373-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html" source="SUSE-SU"/>
    <description>
    Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481</cve>
	<bugzilla href="https://bugzilla.suse.com/1149495">SUSE bug 1149495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602815" comment="curl-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602816" comment="curl-mini-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602817" comment="libcurl-devel-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602818" comment="libcurl-devel-32bit-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602819" comment="libcurl-mini-devel-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602820" comment="libcurl4-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602821" comment="libcurl4-32bit-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602822" comment="libcurl4-mini-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5482</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2373-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192373-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602815" comment="curl-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602816" comment="curl-mini-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602817" comment="libcurl-devel-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602818" comment="libcurl-devel-32bit-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602819" comment="libcurl-mini-devel-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602820" comment="libcurl4-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602821" comment="libcurl4-32bit-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602822" comment="libcurl4-mini-7.60.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5489</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="TID000019369" ref_url="https://www.suse.com/support/kb/doc/?id=000019369" source="SUSE-SU"/>
		<reference ref_id="TID7023616" ref_url="https://www.suse.com/support/kb/doc/?id=7023616" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5716</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5716" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5716" ref_url="https://www.suse.com/security/cve/CVE-2019-5716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.5, the 6LoWPAN dissector could crash. This was addressed in epan/dissectors/packet-6lowpan.c by avoiding use of a TVB before its creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5716/">CVE-2019-5716</cve>
	<bugzilla href="https://bugzilla.suse.com/1121231">SUSE bug 1121231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5717</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5717" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717</cve>
	<bugzilla href="https://bugzilla.suse.com/1121232">SUSE bug 1121232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5718</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5718" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the RTSE dissector and other ASN.1 dissectors could crash. This was addressed in epan/charsets.c by adding a get_t61_string length check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718</cve>
	<bugzilla href="https://bugzilla.suse.com/1121233">SUSE bug 1121233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5719</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the ISAKMP dissector could crash. This was addressed in epan/dissectors/packet-isakmp.c by properly handling the case of a missing decryption data block.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719</cve>
	<bugzilla href="https://bugzilla.suse.com/1121234">SUSE bug 1121234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5721</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5721" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.11, the ENIP dissector could crash. This was addressed in epan/dissectors/packet-enip.c by changing the memory-management approach so that a use-after-free is avoided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721</cve>
	<bugzilla href="https://bugzilla.suse.com/1121235">SUSE bug 1121235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5736</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="TID000019404" ref_url="https://www.suse.com/support/kb/doc/?id=000019404" source="SUSE-SU"/>
		<reference ref_id="TID7023708" ref_url="https://www.suse.com/support/kb/doc/?id=7023708" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0201-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-02/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html" source="SUSE-SU"/>
    <description>
    runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736</cve>
	<bugzilla href="https://bugzilla.suse.com/1121967">SUSE bug 1121967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122185">SUSE bug 1122185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173421">SUSE bug 1173421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602528" comment="containerd-1.2.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602529" comment="containerd-ctr-1.2.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601314" comment="containerd-test-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153866" comment="containerd-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602530" comment="docker-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602531" comment="docker-bash-completion-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602532" comment="docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602533" comment="docker-runc-1.0.0rc8+gitr3826_425e105d5a03-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601319" comment="docker-runc-test-1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171079" comment="docker-runc-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602534" comment="docker-test-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602535" comment="docker-zsh-completion-19.03.1_ce-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601322" comment="go-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153190" comment="go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601323" comment="go-doc-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153191" comment="go-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601324" comment="go-race-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172676" comment="go-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601325" comment="go1.11-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242156" comment="go1.11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601326" comment="go1.11-doc-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242158" comment="go1.11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601327" comment="go1.11-race-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242160" comment="go1.11-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601328" comment="go1.12-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601329" comment="go1.12-doc-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601330" comment="go1.12-race-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602536" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603127" comment="liblxc-devel-3.2.1-lp151.4.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009232209" comment="liblxc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603128" comment="liblxc1-3.2.1-lp151.4.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009232210" comment="liblxc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603129" comment="lxc-3.2.1-lp151.4.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153860" comment="lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603130" comment="lxc-bash-completion-3.2.1-lp151.4.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252364" comment="lxc-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603131" comment="pam_cgfs-3.2.1-lp151.4.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252367" comment="pam_cgfs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5787</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5787" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5787" ref_url="https://www.suse.com/security/cve/CVE-2019-5787" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Use-after-garbage-collection in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5787/">CVE-2019-5787</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5788</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5788" ref_url="https://www.suse.com/security/cve/CVE-2019-5788" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5788/">CVE-2019-5788</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5789" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5789" ref_url="https://www.suse.com/security/cve/CVE-2019-5789" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    An integer overflow that leads to a use-after-free in WebMIDI in Google Chrome on Windows prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5789/">CVE-2019-5789</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5790</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5790" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5790" ref_url="https://www.suse.com/security/cve/CVE-2019-5790" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    An integer overflow leading to an incorrect capacity of a buffer in JavaScript in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5790/">CVE-2019-5790</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5791</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5791" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5791" ref_url="https://www.suse.com/security/cve/CVE-2019-5791" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Inappropriate optimization in V8 in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5791/">CVE-2019-5791</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5792</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5792" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5792" ref_url="https://www.suse.com/security/cve/CVE-2019-5792" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Integer overflow in PDFium in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5792/">CVE-2019-5792</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5793</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5793" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5793" ref_url="https://www.suse.com/security/cve/CVE-2019-5793" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to initiate the extensions installation user interface via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5793/">CVE-2019-5793</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5794</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5794" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5794" ref_url="https://www.suse.com/security/cve/CVE-2019-5794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Incorrect handling of cancelled requests in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5794/">CVE-2019-5794</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5795</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5795" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5795" ref_url="https://www.suse.com/security/cve/CVE-2019-5795" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Integer overflow in PDFium in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5795/">CVE-2019-5795</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5796</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5796" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5796" ref_url="https://www.suse.com/security/cve/CVE-2019-5796" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Data race in extensions guest view in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5796/">CVE-2019-5796</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5797" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5797" ref_url="https://www.suse.com/security/cve/CVE-2019-5797" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Double free in DOMStorage in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5797/">CVE-2019-5797</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5798</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5799</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5799" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5799" ref_url="https://www.suse.com/security/cve/CVE-2019-5799" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Incorrect inheritance of a new document's policy in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5799/">CVE-2019-5799</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5800</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5800" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5800" ref_url="https://www.suse.com/security/cve/CVE-2019-5800" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5800/">CVE-2019-5800</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5801</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5801" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5801" ref_url="https://www.suse.com/security/cve/CVE-2019-5801" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Incorrect eliding of URLs in Omnibox in Google Chrome on iOS prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5801/">CVE-2019-5801</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5802" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5802" ref_url="https://www.suse.com/security/cve/CVE-2019-5802" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5802/">CVE-2019-5802</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5803" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5803" ref_url="https://www.suse.com/security/cve/CVE-2019-5803" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5803/">CVE-2019-5803</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5804</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5804" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5804" ref_url="https://www.suse.com/security/cve/CVE-2019-5804" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Incorrect command line processing in Chrome in Google Chrome prior to 73.0.3683.75 allowed a local attacker to perform domain spoofing via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5804/">CVE-2019-5804</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5805</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5805" ref_url="https://www.suse.com/security/cve/CVE-2019-5805" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5805/">CVE-2019-5805</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5806</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5806" ref_url="https://www.suse.com/security/cve/CVE-2019-5806" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Integer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5806/">CVE-2019-5806</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5807</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5807" ref_url="https://www.suse.com/security/cve/CVE-2019-5807" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Object lifetime issue in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5807/">CVE-2019-5807</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5808</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5808" ref_url="https://www.suse.com/security/cve/CVE-2019-5808" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5808/">CVE-2019-5808</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5809</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5809" ref_url="https://www.suse.com/security/cve/CVE-2019-5809" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5809/">CVE-2019-5809</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5810</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5810" ref_url="https://www.suse.com/security/cve/CVE-2019-5810" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Information leak in autofill in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5810/">CVE-2019-5810</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5811</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5811" ref_url="https://www.suse.com/security/cve/CVE-2019-5811" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5811/">CVE-2019-5811</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5812" ref_url="https://www.suse.com/security/cve/CVE-2019-5812" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Inadequate security UI in iOS UI in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5812/">CVE-2019-5812</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5813</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5813" ref_url="https://www.suse.com/security/cve/CVE-2019-5813" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Use after free in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5813/">CVE-2019-5813</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5814</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5814" ref_url="https://www.suse.com/security/cve/CVE-2019-5814" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5814/">CVE-2019-5814</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5815</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5815" ref_url="https://www.suse.com/security/cve/CVE-2019-5815" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Type confusion in xsltNumberFormatGetMultipleLevel prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5815/">CVE-2019-5815</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5816</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5816" ref_url="https://www.suse.com/security/cve/CVE-2019-5816" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Process lifetime issue in Chrome in Google Chrome on Android prior to 74.0.3729.108 allowed a remote attacker to potentially persist an exploited process via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5816/">CVE-2019-5816</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5817</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5817" ref_url="https://www.suse.com/security/cve/CVE-2019-5817" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5817/">CVE-2019-5817</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5818</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5818" ref_url="https://www.suse.com/security/cve/CVE-2019-5818" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Uninitialized data in media in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5818/">CVE-2019-5818</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5819</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5819" ref_url="https://www.suse.com/security/cve/CVE-2019-5819" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5819/">CVE-2019-5819</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5820</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5820" ref_url="https://www.suse.com/security/cve/CVE-2019-5820" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5820/">CVE-2019-5820</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5821</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5821" ref_url="https://www.suse.com/security/cve/CVE-2019-5821" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5821/">CVE-2019-5821</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5822</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5822" ref_url="https://www.suse.com/security/cve/CVE-2019-5822" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5822/">CVE-2019-5822</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5823</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5823" ref_url="https://www.suse.com/security/cve/CVE-2019-5823" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in service workers in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5823/">CVE-2019-5823</cve>
	<bugzilla href="https://bugzilla.suse.com/1133313">SUSE bug 1133313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5824</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5824" ref_url="https://www.suse.com/security/cve/CVE-2019-5824" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Parameter passing error in media in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5824/">CVE-2019-5824</cve>
	<bugzilla href="https://bugzilla.suse.com/1134218">SUSE bug 1134218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5827</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5827" ref_url="https://www.suse.com/security/cve/CVE-2019-5827" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5827/">CVE-2019-5827</cve>
	<bugzilla href="https://bugzilla.suse.com/1134218">SUSE bug 1134218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5828</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5828" ref_url="https://www.suse.com/security/cve/CVE-2019-5828" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Object lifecycle issue in ServiceWorker in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5828/">CVE-2019-5828</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5829</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5829" ref_url="https://www.suse.com/security/cve/CVE-2019-5829" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Integer overflow in download manager in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5829/">CVE-2019-5829</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5830</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5830" ref_url="https://www.suse.com/security/cve/CVE-2019-5830" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in CORS in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5830/">CVE-2019-5830</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5831</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5831" ref_url="https://www.suse.com/security/cve/CVE-2019-5831" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Object lifecycle issue in V8 in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5831/">CVE-2019-5831</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5832</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5832" ref_url="https://www.suse.com/security/cve/CVE-2019-5832" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in XMLHttpRequest in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5832/">CVE-2019-5832</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5833</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5833" ref_url="https://www.suse.com/security/cve/CVE-2019-5833" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Incorrect dialog box scoping in browser in Google Chrome on Android prior to 75.0.3770.80 allowed a remote attacker to display misleading security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5833/">CVE-2019-5833</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5834</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5834" ref_url="https://www.suse.com/security/cve/CVE-2019-5834" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Blink in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5834/">CVE-2019-5834</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5835</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5835" ref_url="https://www.suse.com/security/cve/CVE-2019-5835" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Object lifecycle issue in SwiftShader in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5835/">CVE-2019-5835</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5836</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5836" ref_url="https://www.suse.com/security/cve/CVE-2019-5836" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in ANGLE in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5836/">CVE-2019-5836</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5837</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5837" ref_url="https://www.suse.com/security/cve/CVE-2019-5837" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Resource size information leakage in Blink in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5837/">CVE-2019-5837</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5838</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5838" ref_url="https://www.suse.com/security/cve/CVE-2019-5838" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions API in Google Chrome prior to 75.0.3770.80 allowed an attacker who convinced a user to install a malicious extension to bypass restrictions on file URIs via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5838/">CVE-2019-5838</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5839</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5839" ref_url="https://www.suse.com/security/cve/CVE-2019-5839" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Excessive data validation in URL parser in Google Chrome prior to 75.0.3770.80 allowed a remote attacker who convinced a user to input a URL to bypass website URL validation via a crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5839/">CVE-2019-5839</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5840</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5840" ref_url="https://www.suse.com/security/cve/CVE-2019-5840" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in popup blocker in Google Chrome on iOS prior to 75.0.3770.80 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5840/">CVE-2019-5840</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5842</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5842" ref_url="https://www.suse.com/security/cve/CVE-2019-5842" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 75.0.3770.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5842/">CVE-2019-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/1137332">SUSE bug 1137332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138287">SUSE bug 1138287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609815" comment="chromedriver-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609816" comment="chromium-75.0.3770.90-lp151.2.9.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5844</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5844" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5844" ref_url="https://www.suse.com/security/cve/CVE-2019-5844" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html" source="SUSE-SU"/>
    <description>
    Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5844/">CVE-2019-5844</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607713" comment="chromedriver-79.0.3945.117-lp151.2.57.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607714" comment="chromium-79.0.3945.117-lp151.2.57.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607715" comment="libre2-0-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607716" comment="libre2-0-32bit-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607717" comment="re2-devel-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5845</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5845" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5845" ref_url="https://www.suse.com/security/cve/CVE-2019-5845" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html" source="SUSE-SU"/>
    <description>
    Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5845/">CVE-2019-5845</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607713" comment="chromedriver-79.0.3945.117-lp151.2.57.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607714" comment="chromium-79.0.3945.117-lp151.2.57.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607715" comment="libre2-0-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607716" comment="libre2-0-32bit-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607717" comment="re2-devel-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5846" ref_url="https://www.suse.com/security/cve/CVE-2019-5846" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html" source="SUSE-SU"/>
    <description>
    Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5846/">CVE-2019-5846</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607713" comment="chromedriver-79.0.3945.117-lp151.2.57.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607714" comment="chromium-79.0.3945.117-lp151.2.57.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607715" comment="libre2-0-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607716" comment="libre2-0-32bit-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607717" comment="re2-devel-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5847</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5847" ref_url="https://www.suse.com/security/cve/CVE-2019-5847" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00057.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in JavaScript in Google Chrome prior to 75.0.3770.142 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5847/">CVE-2019-5847</cve>
	<bugzilla href="https://bugzilla.suse.com/1141649">SUSE bug 1141649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609684" comment="chromedriver-75.0.3770.142-lp151.2.12.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609685" comment="chromium-75.0.3770.142-lp151.2.12.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5848</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5848" ref_url="https://www.suse.com/security/cve/CVE-2019-5848" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00057.html" source="SUSE-SU"/>
    <description>
    Incorrect font handling in autofill in Google Chrome prior to 75.0.3770.142 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5848/">CVE-2019-5848</cve>
	<bugzilla href="https://bugzilla.suse.com/1141649">SUSE bug 1141649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609684" comment="chromedriver-75.0.3770.142-lp151.2.12.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609685" comment="chromium-75.0.3770.142-lp151.2.12.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5850</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5850" ref_url="https://www.suse.com/security/cve/CVE-2019-5850" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in offline mode in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5850/">CVE-2019-5850</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5851</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5851" ref_url="https://www.suse.com/security/cve/CVE-2019-5851" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in WebAudio in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5851/">CVE-2019-5851</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5852</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5852" ref_url="https://www.suse.com/security/cve/CVE-2019-5852" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5852/">CVE-2019-5852</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5853</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5853" ref_url="https://www.suse.com/security/cve/CVE-2019-5853" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5853/">CVE-2019-5853</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5854</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5854" ref_url="https://www.suse.com/security/cve/CVE-2019-5854" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5854/">CVE-2019-5854</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5855</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5855" ref_url="https://www.suse.com/security/cve/CVE-2019-5855" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5855/">CVE-2019-5855</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5856</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5856" ref_url="https://www.suse.com/security/cve/CVE-2019-5856" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in storage in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5856/">CVE-2019-5856</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5857</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5857" ref_url="https://www.suse.com/security/cve/CVE-2019-5857" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5857/">CVE-2019-5857</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5858</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5858" ref_url="https://www.suse.com/security/cve/CVE-2019-5858" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in MacOS services integration in Google Chrome on OS X prior to 76.0.3809.87 allowed a local attacker to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5858/">CVE-2019-5858</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5859</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5859" ref_url="https://www.suse.com/security/cve/CVE-2019-5859" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient filtering in URI schemes in Google Chrome on Windows prior to 76.0.3809.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5859/">CVE-2019-5859</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5860</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5860" ref_url="https://www.suse.com/security/cve/CVE-2019-5860" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5860/">CVE-2019-5860</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5861</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5861" ref_url="https://www.suse.com/security/cve/CVE-2019-5861" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Blink in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to bypass anti-clickjacking policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5861/">CVE-2019-5861</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5862" ref_url="https://www.suse.com/security/cve/CVE-2019-5862" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in AppCache in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5862/">CVE-2019-5862</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5863" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5863" ref_url="https://www.suse.com/security/cve/CVE-2019-5863" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5863/">CVE-2019-5863</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5864</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5864" ref_url="https://www.suse.com/security/cve/CVE-2019-5864" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in CORS in Google Chrome prior to 76.0.3809.87 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5864/">CVE-2019-5864</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5865</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5865" ref_url="https://www.suse.com/security/cve/CVE-2019-5865" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigations in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5865/">CVE-2019-5865</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602052" comment="chromedriver-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602053" comment="chromium-76.0.3809.87-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5867</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5867" ref_url="https://www.suse.com/security/cve/CVE-2019-5867" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in JavaScript in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5867/">CVE-2019-5867</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145242">SUSE bug 1145242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602054" comment="chromedriver-76.0.3809.100-lp151.2.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602055" comment="chromium-76.0.3809.100-lp151.2.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5868</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5868" ref_url="https://www.suse.com/security/cve/CVE-2019-5868" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in PDFium in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5868/">CVE-2019-5868</cve>
	<bugzilla href="https://bugzilla.suse.com/1143492">SUSE bug 1143492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145242">SUSE bug 1145242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602054" comment="chromedriver-76.0.3809.100-lp151.2.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602055" comment="chromium-76.0.3809.100-lp151.2.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5869</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5869" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5869" ref_url="https://www.suse.com/security/cve/CVE-2019-5869" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 76.0.3809.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5869/">CVE-2019-5869</cve>
	<bugzilla href="https://bugzilla.suse.com/1149143">SUSE bug 1149143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602653" comment="chromedriver-76.0.3809.132-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602654" comment="chromium-76.0.3809.132-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5870</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5870" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5870" ref_url="https://www.suse.com/security/cve/CVE-2019-5870" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-5870/">CVE-2019-5870</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5871</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5871" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5871" ref_url="https://www.suse.com/security/cve/CVE-2019-5871" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5871/">CVE-2019-5871</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5872</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5872" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5872" ref_url="https://www.suse.com/security/cve/CVE-2019-5872" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in Mojo in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5872/">CVE-2019-5872</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5874</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5874" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5874" ref_url="https://www.suse.com/security/cve/CVE-2019-5874" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient filtering in URI schemes in Google Chrome on Windows prior to 77.0.3865.75 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5874/">CVE-2019-5874</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5875</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5875" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5875" ref_url="https://www.suse.com/security/cve/CVE-2019-5875" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5875/">CVE-2019-5875</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5876</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5876" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5876" ref_url="https://www.suse.com/security/cve/CVE-2019-5876" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome on Android prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5876/">CVE-2019-5876</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5877</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5877" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5877" ref_url="https://www.suse.com/security/cve/CVE-2019-5877" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5877/">CVE-2019-5877</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5878</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5878" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5878" ref_url="https://www.suse.com/security/cve/CVE-2019-5878" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Use after free in V8 in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5878/">CVE-2019-5878</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5879</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5879" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5879" ref_url="https://www.suse.com/security/cve/CVE-2019-5879" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 77.0.3865.75 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5879/">CVE-2019-5879</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5880</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5880" ref_url="https://www.suse.com/security/cve/CVE-2019-5880" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5880/">CVE-2019-5880</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5881</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5881" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5881" ref_url="https://www.suse.com/security/cve/CVE-2019-5881" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in SwiftShader in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5881/">CVE-2019-5881</cve>
	<bugzilla href="https://bugzilla.suse.com/1150425">SUSE bug 1150425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602823" comment="chromedriver-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602824" comment="chromium-77.0.3865.75-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6133</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html" source="SUSE-SU"/>
    <description>
    In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602122" comment="libpolkit0-0.114-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151393" comment="libpolkit0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602123" comment="libpolkit0-32bit-0.114-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152720" comment="libpolkit0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602124" comment="polkit-0.114-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151394" comment="polkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602125" comment="polkit-devel-0.114-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151395" comment="polkit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602126" comment="polkit-doc-0.114-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152721" comment="polkit-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602127" comment="typelib-1_0-Polkit-1_0-0.114-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151396" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6237</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6237" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6237" ref_url="https://www.suse.com/security/cve/CVE-2019-6237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6237/">CVE-2019-6237</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6283</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6283" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6283" ref_url="https://www.suse.com/security/cve/CVE-2019-6283" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::parenthese_scope in prelexer.hpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-6283/">CVE-2019-6283</cve>
	<bugzilla href="https://bugzilla.suse.com/1121943">SUSE bug 1121943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6284" ref_url="https://www.suse.com/security/cve/CVE-2019-6284" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-6284/">CVE-2019-6284</cve>
	<bugzilla href="https://bugzilla.suse.com/1121944">SUSE bug 1121944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6286</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6286" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6286" ref_url="https://www.suse.com/security/cve/CVE-2019-6286" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html" source="SUSE-SU"/>
    <description>
    In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::skip_over_scopes in prelexer.hpp when called from Sass::Parser::parse_import(), a similar issue to CVE-2018-11693.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-6286/">CVE-2019-6286</cve>
	<bugzilla href="https://bugzilla.suse.com/1121945">SUSE bug 1121945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601970" comment="libsass-3_6_1-1-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260549" comment="libsass-3_6_1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601971" comment="libsass-devel-3.6.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166594" comment="libsass-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6446</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6446" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2462-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00015.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED **   An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is  a behavior that might have legitimate applications in (for example)  loading serialized Python object arrays from trusted and authenticated  sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603095" comment="python2-numpy-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177233" comment="python2-numpy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603096" comment="python2-numpy-devel-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245323" comment="python2-numpy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603097" comment="python2-numpy-gnu-hpc-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245324" comment="python2-numpy-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603098" comment="python2-numpy-gnu-hpc-devel-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245325" comment="python2-numpy-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603099" comment="python2-numpy_1_16_1-gnu-hpc-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266981" comment="python2-numpy_1_16_1-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603100" comment="python2-numpy_1_16_1-gnu-hpc-devel-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266982" comment="python2-numpy_1_16_1-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603101" comment="python3-numpy-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245328" comment="python3-numpy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603102" comment="python3-numpy-devel-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245329" comment="python3-numpy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603103" comment="python3-numpy-gnu-hpc-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245330" comment="python3-numpy-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603104" comment="python3-numpy-gnu-hpc-devel-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245331" comment="python3-numpy-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603105" comment="python3-numpy_1_16_1-gnu-hpc-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266983" comment="python3-numpy_1_16_1-gnu-hpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603106" comment="python3-numpy_1_16_1-gnu-hpc-devel-1.16.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266984" comment="python3-numpy_1_16_1-gnu-hpc-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6465</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6465" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P2, 9.12.0 -&gt; 9.12.3-P2, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601418" comment="bind-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601419" comment="bind-chrootenv-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601420" comment="bind-devel-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601421" comment="bind-devel-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601422" comment="bind-doc-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601423" comment="bind-lwresd-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601424" comment="bind-utils-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601425" comment="libbind9-160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177141" comment="libbind9-160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601426" comment="libbind9-160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256545" comment="libbind9-160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601427" comment="libdns169-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177142" comment="libdns169 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601428" comment="libdns169-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256548" comment="libdns169-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601429" comment="libirs-devel-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601430" comment="libirs160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177143" comment="libirs160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601431" comment="libirs160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256553" comment="libirs160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601432" comment="libisc166-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177144" comment="libisc166 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601433" comment="libisc166-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256556" comment="libisc166-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601434" comment="libisccc160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177145" comment="libisccc160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601435" comment="libisccc160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256559" comment="libisccc160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601436" comment="libisccfg160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177146" comment="libisccfg160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601437" comment="libisccfg160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256562" comment="libisccfg160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601438" comment="liblwres160-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177147" comment="liblwres160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601439" comment="liblwres160-32bit-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256565" comment="liblwres160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601440" comment="python3-bind-9.11.2-lp151.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6470</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6470" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2657-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192657-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2727-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00048.html" source="SUSE-SU"/>
    <description>
    There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470</cve>
	<bugzilla href="https://bugzilla.suse.com/1134078">SUSE bug 1134078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603315" comment="dhcp-4.3.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151310" comment="dhcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603316" comment="dhcp-client-4.3.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151311" comment="dhcp-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603317" comment="dhcp-devel-4.3.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153188" comment="dhcp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603318" comment="dhcp-doc-4.3.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151312" comment="dhcp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603319" comment="dhcp-relay-4.3.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151313" comment="dhcp-relay is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603320" comment="dhcp-server-4.3.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151314" comment="dhcp-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6471</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6471" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6471" ref_url="https://www.suse.com/security/cve/CVE-2019-6471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00013.html" source="SUSE-SU"/>
    <description>
    A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -&gt; 9.11.7, 9.12.0 -&gt; 9.12.4-P1, 9.14.0 -&gt; 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -&gt; 9.11.7-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6471/">CVE-2019-6471</cve>
	<bugzilla href="https://bugzilla.suse.com/1138687">SUSE bug 1138687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603143" comment="bind-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603144" comment="bind-chrootenv-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603145" comment="bind-devel-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603146" comment="bind-devel-32bit-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603147" comment="bind-doc-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603148" comment="bind-lwresd-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153104" comment="bind-lwresd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603149" comment="bind-utils-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603150" comment="libbind9-160-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177141" comment="libbind9-160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603151" comment="libbind9-160-32bit-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256545" comment="libbind9-160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603152" comment="libdns169-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177142" comment="libdns169 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603153" comment="libdns169-32bit-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256548" comment="libdns169-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603154" comment="libirs-devel-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603155" comment="libirs160-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177143" comment="libirs160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603156" comment="libirs160-32bit-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256553" comment="libirs160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603157" comment="libisc166-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177144" comment="libisc166 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603158" comment="libisc166-32bit-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256556" comment="libisc166-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603159" comment="libisccc160-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177145" comment="libisccc160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603160" comment="libisccc160-32bit-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256559" comment="libisccc160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603161" comment="libisccfg160-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177146" comment="libisccfg160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603162" comment="libisccfg160-32bit-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256562" comment="libisccfg160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603163" comment="liblwres160-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177147" comment="liblwres160 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603164" comment="liblwres160-32bit-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256565" comment="liblwres160-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603165" comment="python3-bind-9.11.2-lp151.11.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6477</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered authoritatively or from cache. (This is most likely to be perceived as an intermittent server problem).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477</cve>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197136">SUSE bug 1197136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6486</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6486" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6486" ref_url="https://www.suse.com/security/cve/CVE-2019-6486" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005468.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html" source="SUSE-SU"/>
    <description>
    Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6486/">CVE-2019-6486</cve>
	<bugzilla href="https://bugzilla.suse.com/1123013">SUSE bug 1123013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601312" comment="containerd-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601313" comment="containerd-ctr-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601314" comment="containerd-test-1.2.5-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153866" comment="containerd-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601315" comment="docker-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601316" comment="docker-bash-completion-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601317" comment="docker-libnetwork-0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601318" comment="docker-runc-1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601319" comment="docker-runc-test-1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171079" comment="docker-runc-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601320" comment="docker-test-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601321" comment="docker-zsh-completion-18.09.6_ce-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601322" comment="go-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153190" comment="go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601323" comment="go-doc-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153191" comment="go-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601324" comment="go-race-1.12-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172676" comment="go-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601325" comment="go1.11-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242156" comment="go1.11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601326" comment="go1.11-doc-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242158" comment="go1.11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601327" comment="go1.11-race-1.11.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242160" comment="go1.11-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601328" comment="go1.12-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601329" comment="go1.12-doc-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601330" comment="go1.12-race-1.12.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601331" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6778</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602574" comment="fuse-overlayfs-0.4.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266785" comment="fuse-overlayfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602575" comment="fuse3-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266786" comment="fuse3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602576" comment="fuse3-devel-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266787" comment="fuse3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602577" comment="fuse3-doc-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266788" comment="fuse3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602578" comment="libcontainers-common-20190401-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266789" comment="libcontainers-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602579" comment="libfuse3-3-3.6.1-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266790" comment="libfuse3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602580" comment="podman-1.4.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602581" comment="podman-cni-config-1.4.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607382" comment="qemu-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607383" comment="qemu-arm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607384" comment="qemu-audio-alsa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607385" comment="qemu-audio-oss-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607386" comment="qemu-audio-pa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607387" comment="qemu-audio-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607388" comment="qemu-block-curl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607389" comment="qemu-block-dmg-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607390" comment="qemu-block-gluster-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607391" comment="qemu-block-iscsi-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607392" comment="qemu-block-nfs-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607393" comment="qemu-block-rbd-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607394" comment="qemu-block-ssh-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607395" comment="qemu-extra-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607396" comment="qemu-guest-agent-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607397" comment="qemu-ipxe-1.0.0+-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607398" comment="qemu-ksm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607399" comment="qemu-kvm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607400" comment="qemu-lang-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607401" comment="qemu-linux-user-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607402" comment="qemu-ppc-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607403" comment="qemu-s390-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607404" comment="qemu-seabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607405" comment="qemu-sgabios-8-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607406" comment="qemu-tools-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607407" comment="qemu-ui-curses-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607408" comment="qemu-ui-gtk-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607409" comment="qemu-ui-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607410" comment="qemu-vgabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607411" comment="qemu-x86-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602582" comment="slirp4netns-0.3.0-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266793" comment="slirp4netns is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7150</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2261-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192261-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2374-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192374-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html" source="SUSE-SU"/>
    <description>
    SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164</cve>
	<bugzilla href="https://bugzilla.suse.com/1124593">SUSE bug 1124593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602632" comment="python-SQLAlchemy-doc-1.2.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263221" comment="python-SQLAlchemy-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602633" comment="python2-SQLAlchemy-1.2.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263222" comment="python2-SQLAlchemy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602634" comment="python3-SQLAlchemy-1.2.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263223" comment="python3-SQLAlchemy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7165</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7165" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7165" ref_url="https://www.suse.com/security/cve/CVE-2019-7165" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00053.html" source="SUSE-SU"/>
    <description>
    A buffer overflow in DOSBox 0.74-2 allows attackers to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-7165/">CVE-2019-7165</cve>
	<bugzilla href="https://bugzilla.suse.com/1140254">SUSE bug 1140254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609740" comment="dosbox-0.74.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261752" comment="dosbox is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7314</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7314" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7314" ref_url="https://www.suse.com/security/cve/CVE-2019-7314" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html" source="SUSE-SU"/>
    <description>
    liblivemedia in Live555 before 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-7314/">CVE-2019-7314</cve>
	<bugzilla href="https://bugzilla.suse.com/1124159">SUSE bug 1124159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609817" comment="libBasicUsageEnvironment1-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260574" comment="libBasicUsageEnvironment1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609818" comment="libUsageEnvironment3-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260576" comment="libUsageEnvironment3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609819" comment="libgroupsock8-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260578" comment="libgroupsock8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609820" comment="libliveMedia66-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260580" comment="libliveMedia66 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609821" comment="live555-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243095" comment="live555 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609822" comment="live555-devel-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243097" comment="live555-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7317</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165297">SUSE bug 1165297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602128" comment="java-11-openjdk-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602129" comment="java-11-openjdk-accessibility-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602130" comment="java-11-openjdk-demo-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602131" comment="java-11-openjdk-devel-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602132" comment="java-11-openjdk-headless-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602133" comment="java-11-openjdk-javadoc-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602134" comment="java-11-openjdk-jmods-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602135" comment="java-11-openjdk-src-11.0.4.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602101" comment="java-1_8_0-openjdk-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602102" comment="java-1_8_0-openjdk-accessibility-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602103" comment="java-1_8_0-openjdk-demo-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602104" comment="java-1_8_0-openjdk-devel-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602105" comment="java-1_8_0-openjdk-headless-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602106" comment="java-1_8_0-openjdk-javadoc-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602107" comment="java-1_8_0-openjdk-src-1.8.0.222-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601411" comment="libpng16-16-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601412" comment="libpng16-16-32bit-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151415" comment="libpng16-16-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601413" comment="libpng16-compat-devel-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601414" comment="libpng16-compat-devel-32bit-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153135" comment="libpng16-compat-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601415" comment="libpng16-devel-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601416" comment="libpng16-devel-32bit-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153136" comment="libpng16-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601417" comment="libpng16-tools-1.6.34-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7548</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7548" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7548" ref_url="https://www.suse.com/security/cve/CVE-2019-7548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2261-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192261-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2374-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192374-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html" source="SUSE-SU"/>
    <description>
    SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7548/">CVE-2019-7548</cve>
	<bugzilla href="https://bugzilla.suse.com/1124593">SUSE bug 1124593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602632" comment="python-SQLAlchemy-doc-1.2.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263221" comment="python-SQLAlchemy-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602633" comment="python2-SQLAlchemy-1.2.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263222" comment="python2-SQLAlchemy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602634" comment="python3-SQLAlchemy-1.2.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009263223" comment="python3-SQLAlchemy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7635</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7635" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602646" comment="libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172250" comment="libSDL_image-1_2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602647" comment="libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172251" comment="libSDL_image-1_2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602648" comment="libSDL_image-devel-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172252" comment="libSDL_image-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602649" comment="libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172253" comment="libSDL_image-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7637</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7637" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010802.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00071.html" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134135">SUSE bug 1134135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601627" comment="libSDL2-2_0-0-2.0.8-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166226" comment="libSDL2-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601628" comment="libSDL2-2_0-0-32bit-2.0.8-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166228" comment="libSDL2-2_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601629" comment="libSDL2-devel-2.0.8-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166230" comment="libSDL2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601630" comment="libSDL2-devel-32bit-2.0.8-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166232" comment="libSDL2-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7665</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601563" comment="elfutils-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152057" comment="elfutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601564" comment="elfutils-lang-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177194" comment="elfutils-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601565" comment="libasm-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257556" comment="libasm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601566" comment="libasm1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152058" comment="libasm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601567" comment="libasm1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257559" comment="libasm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601568" comment="libdw-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257561" comment="libdw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601569" comment="libdw1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152059" comment="libdw1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601570" comment="libdw1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177195" comment="libdw1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601571" comment="libebl-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257565" comment="libebl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601572" comment="libebl-plugins-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177196" comment="libebl-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601573" comment="libebl-plugins-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177197" comment="libebl-plugins-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601574" comment="libelf-devel-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257569" comment="libelf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601575" comment="libelf-devel-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257571" comment="libelf-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601576" comment="libelf1-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152060" comment="libelf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601577" comment="libelf1-32bit-0.168-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152061" comment="libelf1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8075</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8075" ref_url="https://www.suse.com/security/cve/CVE-2019-8075" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Adobe Flash Player version 32.0.0.192 and earlier versions have a Same Origin Policy Bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-8075/">CVE-2019-8075</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8320</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8320" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320</cve>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8321</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8321" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321</cve>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8322</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8322" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322</cve>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8323</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8323" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323</cve>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8324</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8324" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324</cve>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8325</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8325" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325</cve>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601858" comment="libruby2_5-2_5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601859" comment="ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260284" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601860" comment="ruby2.5-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601861" comment="ruby2.5-devel-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601862" comment="ruby2.5-devel-extra-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601863" comment="ruby2.5-doc-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601864" comment="ruby2.5-doc-ri-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601865" comment="ruby2.5-stdlib-2.5.5-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8551</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8558</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8559</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8563</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8571</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8571" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8571" ref_url="https://www.suse.com/security/cve/CVE-2019-8571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8571/">CVE-2019-8571</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8583</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8583" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8583" ref_url="https://www.suse.com/security/cve/CVE-2019-8583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8583/">CVE-2019-8583</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8584</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8584" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8584" ref_url="https://www.suse.com/security/cve/CVE-2019-8584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8584/">CVE-2019-8584</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8586</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8586" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8586" ref_url="https://www.suse.com/security/cve/CVE-2019-8586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8586/">CVE-2019-8586</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8587</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8587" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8587" ref_url="https://www.suse.com/security/cve/CVE-2019-8587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8587/">CVE-2019-8587</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8594</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8594" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8594" ref_url="https://www.suse.com/security/cve/CVE-2019-8594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8594/">CVE-2019-8594</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8595</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8596</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8596" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8596" ref_url="https://www.suse.com/security/cve/CVE-2019-8596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8596/">CVE-2019-8596</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8597</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8597" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8597" ref_url="https://www.suse.com/security/cve/CVE-2019-8597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8597/">CVE-2019-8597</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8601</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8601" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8601" ref_url="https://www.suse.com/security/cve/CVE-2019-8601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8601/">CVE-2019-8601</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8607</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may result in the disclosure of process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8608</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8608" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8608" ref_url="https://www.suse.com/security/cve/CVE-2019-8608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8608/">CVE-2019-8608</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8609</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8609" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8609" ref_url="https://www.suse.com/security/cve/CVE-2019-8609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8609/">CVE-2019-8609</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8610</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8610" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8610" ref_url="https://www.suse.com/security/cve/CVE-2019-8610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8610/">CVE-2019-8610</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8611</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8611" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8611" ref_url="https://www.suse.com/security/cve/CVE-2019-8611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8611/">CVE-2019-8611</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8615</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8619</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8619" ref_url="https://www.suse.com/security/cve/CVE-2019-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8619/">CVE-2019-8619</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8622" ref_url="https://www.suse.com/security/cve/CVE-2019-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8622/">CVE-2019-8622</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8623</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8623" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8623" ref_url="https://www.suse.com/security/cve/CVE-2019-8623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8623/">CVE-2019-8623</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601840" comment="libjavascriptcoregtk-4_0-18-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601841" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601842" comment="libwebkit2gtk-4_0-37-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601843" comment="libwebkit2gtk-4_0-37-32bit-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601844" comment="libwebkit2gtk3-lang-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601845" comment="typelib-1_0-JavaScriptCore-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601846" comment="typelib-1_0-WebKit2-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601847" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601848" comment="webkit-jsc-4-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601849" comment="webkit2gtk-4_0-injected-bundles-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601850" comment="webkit2gtk3-devel-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601851" comment="webkit2gtk3-minibrowser-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601852" comment="webkit2gtk3-plugin-process-gtk2-2.24.2-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8644</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8649</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A logic issue existed in the handling of synchronous page loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8658</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8666</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8669</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8671</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8672</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13, Safari 13. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8675</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00070.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603770" comment="cups-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603771" comment="cups-client-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603772" comment="cups-config-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603773" comment="cups-ddk-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603774" comment="cups-devel-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603775" comment="cups-devel-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231804" comment="cups-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603776" comment="libcups2-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603777" comment="libcups2-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231805" comment="libcups2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603778" comment="libcupscgi1-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177131" comment="libcupscgi1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603779" comment="libcupscgi1-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231806" comment="libcupscgi1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603780" comment="libcupsimage2-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603781" comment="libcupsimage2-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231807" comment="libcupsimage2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603782" comment="libcupsmime1-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177133" comment="libcupsmime1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603783" comment="libcupsmime1-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231808" comment="libcupsmime1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603784" comment="libcupsppdc1-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177134" comment="libcupsppdc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603785" comment="libcupsppdc1-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231809" comment="libcupsppdc1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8677</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8679</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8680</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8681</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8683</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603060" comment="libjavascriptcoregtk-4_0-18-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603061" comment="libjavascriptcoregtk-4_0-18-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603062" comment="libwebkit2gtk-4_0-37-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603063" comment="libwebkit2gtk-4_0-37-32bit-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603064" comment="libwebkit2gtk3-lang-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603065" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603066" comment="typelib-1_0-WebKit2-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603067" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603068" comment="webkit-jsc-4-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603069" comment="webkit2gtk-4_0-injected-bundles-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603070" comment="webkit2gtk3-devel-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603071" comment="webkit2gtk3-minibrowser-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8684</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8686</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8687</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8688</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8689</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8690</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue existed in the handling of document loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603072" comment="webkit2gtk3-plugin-process-gtk2-2.24.4-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166855" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00070.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603770" comment="cups-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603771" comment="cups-client-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603772" comment="cups-config-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603773" comment="cups-ddk-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603774" comment="cups-devel-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603775" comment="cups-devel-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231804" comment="cups-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603776" comment="libcups2-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603777" comment="libcups2-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231805" comment="libcups2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603778" comment="libcupscgi1-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177131" comment="libcupscgi1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603779" comment="libcupscgi1-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231806" comment="libcupscgi1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603780" comment="libcupsimage2-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603781" comment="libcupsimage2-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231807" comment="libcupsimage2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603782" comment="libcupsmime1-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177133" comment="libcupsmime1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603783" comment="libcupsmime1-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231808" comment="libcupsmime1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603784" comment="libcupsppdc1-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177134" comment="libcupsppdc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603785" comment="libcupsppdc1-32bit-2.2.7-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231809" comment="libcupsppdc1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8710</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8719</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8720</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8726</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8726" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8733</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8735</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8735" ref_url="https://www.suse.com/security/cve/CVE-2019-8735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8735/">CVE-2019-8735</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8743</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8763</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.1 and iPadOS 13.1, tvOS 13, Safari 13.0.1, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8764</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8766</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8768</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8768" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    "Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Catalina 10.15. A user may be unable to delete browsing history items.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-26"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    An issue existed in the drawing of web page elements. The issue was addressed with improved logic. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Visiting a maliciously crafted website may reveal browsing history.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1, iOS 13. Maliciously crafted web content may violate iframe sandboxing policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8782</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8783</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8808</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8811</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8813</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8814</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8815</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8816</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8819</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8820</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8821</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8822</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8823</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603798" comment="libjavascriptcoregtk-4_0-18-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603799" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603800" comment="libwebkit2gtk-4_0-37-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603801" comment="libwebkit2gtk-4_0-37-32bit-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603802" comment="libwebkit2gtk3-lang-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603803" comment="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603804" comment="typelib-1_0-WebKit2-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603805" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603806" comment="webkit-jsc-4-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603807" comment="webkit2gtk-4_0-injected-bundles-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603808" comment="webkit2gtk3-devel-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603809" comment="webkit2gtk3-minibrowser-2.26.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8835</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835</cve>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606980" comment="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606981" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606982" comment="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606983" comment="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606984" comment="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606985" comment="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606986" comment="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606987" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606988" comment="webkit-jsc-4-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606989" comment="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606990" comment="webkit2gtk3-devel-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606991" comment="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8844</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8844" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844</cve>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606980" comment="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606981" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606982" comment="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606983" comment="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606984" comment="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606985" comment="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606986" comment="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606987" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606988" comment="webkit-jsc-4-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606989" comment="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606990" comment="webkit2gtk3-devel-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606991" comment="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846</cve>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606980" comment="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606981" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606982" comment="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606983" comment="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606984" comment="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606985" comment="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606986" comment="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606987" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606988" comment="webkit-jsc-4-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606989" comment="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606990" comment="webkit2gtk3-devel-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606991" comment="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9020</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020</cve>
	<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9021</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021</cve>
	<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9022</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9022" ref_url="https://www.suse.com/security/cve/CVE-2019-9022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9022/">CVE-2019-9022</cve>
	<bugzilla href="https://bugzilla.suse.com/1126827">SUSE bug 1126827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023</cve>
	<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9024</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024</cve>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9074</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074</cve>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605845" comment="binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605846" comment="binutils-devel-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605847" comment="binutils-devel-32bit-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605848" comment="binutils-gold-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605849" comment="cross-aarch64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605850" comment="cross-arm-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605851" comment="cross-avr-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605852" comment="cross-epiphany-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605853" comment="cross-hppa-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605854" comment="cross-hppa64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605855" comment="cross-i386-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605856" comment="cross-ia64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605857" comment="cross-m68k-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605858" comment="cross-mips-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605859" comment="cross-ppc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605860" comment="cross-ppc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605861" comment="cross-ppc64le-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605862" comment="cross-riscv64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605863" comment="cross-rx-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605864" comment="cross-s390-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605865" comment="cross-s390x-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605866" comment="cross-sparc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605867" comment="cross-sparc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605868" comment="cross-spu-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605869" comment="libctf-nobfd0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605870" comment="libctf0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9075</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-27"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075</cve>
	<bugzilla href="https://bugzilla.suse.com/1071544">SUSE bug 1071544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193110">SUSE bug 1193110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605845" comment="binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605846" comment="binutils-devel-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605847" comment="binutils-devel-32bit-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605848" comment="binutils-gold-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605849" comment="cross-aarch64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605850" comment="cross-arm-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605851" comment="cross-avr-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605852" comment="cross-epiphany-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605853" comment="cross-hppa-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605854" comment="cross-hppa64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605855" comment="cross-i386-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605856" comment="cross-ia64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605857" comment="cross-m68k-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605858" comment="cross-mips-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605859" comment="cross-ppc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605860" comment="cross-ppc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605861" comment="cross-ppc64le-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605862" comment="cross-riscv64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605863" comment="cross-rx-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605864" comment="cross-s390-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605865" comment="cross-s390x-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605866" comment="cross-sparc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605867" comment="cross-sparc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605868" comment="cross-spu-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605869" comment="libctf-nobfd0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605870" comment="libctf0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9077</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077</cve>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605845" comment="binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605846" comment="binutils-devel-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605847" comment="binutils-devel-32bit-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167590" comment="binutils-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605848" comment="binutils-gold-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167592" comment="binutils-gold is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605849" comment="cross-aarch64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605850" comment="cross-arm-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605851" comment="cross-avr-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605852" comment="cross-epiphany-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605853" comment="cross-hppa-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605854" comment="cross-hppa64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605855" comment="cross-i386-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605856" comment="cross-ia64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605857" comment="cross-m68k-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605858" comment="cross-mips-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605859" comment="cross-ppc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605860" comment="cross-ppc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605861" comment="cross-ppc64le-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605862" comment="cross-riscv64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605863" comment="cross-rx-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605864" comment="cross-s390-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605865" comment="cross-s390x-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605866" comment="cross-sparc-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605867" comment="cross-sparc64-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605868" comment="cross-spu-binutils-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605869" comment="libctf-nobfd0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605870" comment="libctf0-2.35-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9208</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9208" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf by avoiding NULL pointer dereferences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208</cve>
	<bugzilla href="https://bugzilla.suse.com/1127370">SUSE bug 1127370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9209</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9209" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209</cve>
	<bugzilla href="https://bugzilla.suse.com/1127369">SUSE bug 1127369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9214</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214</cve>
	<bugzilla href="https://bugzilla.suse.com/1127367">SUSE bug 1127367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9215" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9215" ref_url="https://www.suse.com/security/cve/CVE-2019-9215" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html" source="SUSE-SU"/>
    <description>
    In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9215/">CVE-2019-9215</cve>
	<bugzilla href="https://bugzilla.suse.com/1127341">SUSE bug 1127341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609817" comment="libBasicUsageEnvironment1-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260574" comment="libBasicUsageEnvironment1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609818" comment="libUsageEnvironment3-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260576" comment="libUsageEnvironment3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609819" comment="libgroupsock8-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260578" comment="libgroupsock8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609820" comment="libliveMedia66-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260580" comment="libliveMedia66 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609821" comment="live555-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243095" comment="live555 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609822" comment="live555-devel-2019.06.28-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243097" comment="live555-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9232</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006524.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html" source="SUSE-SU"/>
    <description>
    In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122675483
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232</cve>
	<bugzilla href="https://bugzilla.suse.com/1160613">SUSE bug 1160613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604374" comment="libvpx-devel-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170222" comment="libvpx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604375" comment="libvpx4-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177224" comment="libvpx4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604376" comment="libvpx4-32bit-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277006" comment="libvpx4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604377" comment="vpx-tools-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170228" comment="vpx-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9278</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9278" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608454" comment="libexif-devel-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608455" comment="libexif-devel-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279253" comment="libexif-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608456" comment="libexif12-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608457" comment="libexif12-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9325</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9325" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9325" ref_url="https://www.suse.com/security/cve/CVE-2019-9325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html" source="SUSE-SU"/>
    <description>
    In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112001302
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9325/">CVE-2019-9325</cve>
	<bugzilla href="https://bugzilla.suse.com/1160612">SUSE bug 1160612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604374" comment="libvpx-devel-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170222" comment="libvpx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604375" comment="libvpx4-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177224" comment="libvpx4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604376" comment="libvpx4-32bit-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277006" comment="libvpx4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604377" comment="vpx-tools-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170228" comment="vpx-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9371</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9371" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9371" ref_url="https://www.suse.com/security/cve/CVE-2019-9371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html" source="SUSE-SU"/>
    <description>
    In libvpx, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-132783254
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9371/">CVE-2019-9371</cve>
	<bugzilla href="https://bugzilla.suse.com/1160615">SUSE bug 1160615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604374" comment="libvpx-devel-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170222" comment="libvpx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604375" comment="libvpx4-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177224" comment="libvpx4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604376" comment="libvpx4-32bit-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277006" comment="libvpx4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604377" comment="vpx-tools-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170228" comment="vpx-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9433</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9433" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006524.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.html" source="SUSE-SU"/>
    <description>
    In libvpx, there is a possible information disclosure due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-80479354
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433</cve>
	<bugzilla href="https://bugzilla.suse.com/1160614">SUSE bug 1160614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604374" comment="libvpx-devel-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170222" comment="libvpx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604375" comment="libvpx4-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177224" comment="libvpx4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604376" comment="libvpx4-32bit-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277006" comment="libvpx4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604377" comment="vpx-tools-1.6.1-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170228" comment="vpx-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9455</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9455" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455</cve>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9456</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9456" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602852" comment="kernel-debug-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602853" comment="kernel-debug-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602854" comment="kernel-debug-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602855" comment="kernel-default-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602856" comment="kernel-default-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602857" comment="kernel-default-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602858" comment="kernel-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602859" comment="kernel-docs-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602860" comment="kernel-docs-html-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602861" comment="kernel-kvmsmall-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602862" comment="kernel-kvmsmall-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602863" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602864" comment="kernel-macros-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602865" comment="kernel-obs-build-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602866" comment="kernel-obs-qa-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602867" comment="kernel-source-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602868" comment="kernel-source-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602869" comment="kernel-syms-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602870" comment="kernel-vanilla-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602871" comment="kernel-vanilla-base-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602872" comment="kernel-vanilla-devel-4.12.14-lp151.28.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9458</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607559" comment="kernel-debug-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607560" comment="kernel-debug-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607561" comment="kernel-debug-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607562" comment="kernel-default-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607563" comment="kernel-default-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607564" comment="kernel-default-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607565" comment="kernel-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607566" comment="kernel-docs-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607567" comment="kernel-docs-html-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607568" comment="kernel-kvmsmall-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607571" comment="kernel-macros-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607572" comment="kernel-obs-build-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607573" comment="kernel-obs-qa-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607574" comment="kernel-source-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607575" comment="kernel-source-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607576" comment="kernel-syms-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607577" comment="kernel-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607578" comment="kernel-vanilla-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607579" comment="kernel-vanilla-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9494</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9494" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494</cve>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609617" comment="hostapd-2.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9495</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9495" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495</cve>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609617" comment="hostapd-2.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9496</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9496" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9496" ref_url="https://www.suse.com/security/cve/CVE-2019-9496" source="SUSE CVE"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
    <description>
    An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9496/">CVE-2019-9496</cve>
	<bugzilla href="https://bugzilla.suse.com/1131869">SUSE bug 1131869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609617" comment="hostapd-2.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9497</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9497" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609617" comment="hostapd-2.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609617" comment="hostapd-2.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9499</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9499" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609617" comment="hostapd-2.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166193" comment="hostapd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606347" comment="wpa_supplicant-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606348" comment="wpa_supplicant-gui-2.9-lp151.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152146" comment="wpa_supplicant-gui is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9500</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500</cve>
	<bugzilla href="https://bugzilla.suse.com/1132681">SUSE bug 1132681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9503</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<bugzilla href="https://bugzilla.suse.com/1132673">SUSE bug 1132673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156653">SUSE bug 1156653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601362" comment="kernel-debug-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601363" comment="kernel-debug-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601364" comment="kernel-debug-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601365" comment="kernel-default-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601366" comment="kernel-default-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601367" comment="kernel-default-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601368" comment="kernel-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601369" comment="kernel-docs-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601370" comment="kernel-docs-html-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601371" comment="kernel-kvmsmall-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601372" comment="kernel-kvmsmall-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601373" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601374" comment="kernel-macros-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601375" comment="kernel-obs-build-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601376" comment="kernel-obs-qa-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601377" comment="kernel-source-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601378" comment="kernel-source-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601379" comment="kernel-syms-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601380" comment="kernel-vanilla-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601381" comment="kernel-vanilla-base-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601382" comment="kernel-vanilla-devel-4.12.14-lp151.28.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9506</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603277" comment="kernel-debug-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603278" comment="kernel-debug-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603279" comment="kernel-debug-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603280" comment="kernel-default-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603281" comment="kernel-default-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603282" comment="kernel-default-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603283" comment="kernel-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603284" comment="kernel-docs-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603285" comment="kernel-docs-html-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603286" comment="kernel-kvmsmall-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603287" comment="kernel-kvmsmall-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603288" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603289" comment="kernel-macros-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603290" comment="kernel-obs-build-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603291" comment="kernel-obs-qa-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603292" comment="kernel-source-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603293" comment="kernel-source-vanilla-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603294" comment="kernel-syms-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603295" comment="kernel-vanilla-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603296" comment="kernel-vanilla-base-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603297" comment="kernel-vanilla-devel-4.12.14-lp151.28.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9511</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<bugzilla href="https://bugzilla.suse.com/1145579">SUSE bug 1145579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146091">SUSE bug 1146091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193427">SUSE bug 1193427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603107" comment="libnghttp2-14-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603108" comment="libnghttp2-14-32bit-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177223" comment="libnghttp2-14-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603109" comment="libnghttp2-devel-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153584" comment="libnghttp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603110" comment="libnghttp2_asio-devel-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153585" comment="libnghttp2_asio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603111" comment="libnghttp2_asio1-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153586" comment="libnghttp2_asio1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603112" comment="libnghttp2_asio1-32bit-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267106" comment="libnghttp2_asio1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603113" comment="nghttp2-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153587" comment="nghttp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602679" comment="nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602680" comment="nginx-source-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266795" comment="nginx-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602671" comment="nodejs10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602672" comment="nodejs10-devel-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602673" comment="nodejs10-docs-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602675" comment="nodejs8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602676" comment="nodejs8-devel-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602677" comment="nodejs8-docs-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602674" comment="npm10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602678" comment="npm8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603114" comment="python3-nghttp2-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267108" comment="python3-nghttp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602681" comment="vim-plugin-nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173966" comment="vim-plugin-nginx is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9512</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512</cve>
	<bugzilla href="https://bugzilla.suse.com/1145663">SUSE bug 1145663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146099">SUSE bug 1146099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146111">SUSE bug 1146111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147142">SUSE bug 1147142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602650" comment="go1.11-1.11.13-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242156" comment="go1.11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602651" comment="go1.11-doc-1.11.13-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242158" comment="go1.11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602652" comment="go1.11-race-1.11.13-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242160" comment="go1.11-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602709" comment="go1.12-1.12.9-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602710" comment="go1.12-doc-1.12.9-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602711" comment="go1.12-race-1.12.9-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602671" comment="nodejs10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602672" comment="nodejs10-devel-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602673" comment="nodejs10-docs-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602675" comment="nodejs8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602676" comment="nodejs8-devel-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602677" comment="nodejs8-docs-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602674" comment="npm10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602678" comment="npm8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9513</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<bugzilla href="https://bugzilla.suse.com/1145580">SUSE bug 1145580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146094">SUSE bug 1146094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193427">SUSE bug 1193427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603107" comment="libnghttp2-14-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603108" comment="libnghttp2-14-32bit-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177223" comment="libnghttp2-14-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603109" comment="libnghttp2-devel-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153584" comment="libnghttp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603110" comment="libnghttp2_asio-devel-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153585" comment="libnghttp2_asio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603111" comment="libnghttp2_asio1-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153586" comment="libnghttp2_asio1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603112" comment="libnghttp2_asio1-32bit-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267106" comment="libnghttp2_asio1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603113" comment="nghttp2-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153587" comment="nghttp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602679" comment="nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602680" comment="nginx-source-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266795" comment="nginx-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602671" comment="nodejs10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602672" comment="nodejs10-devel-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602673" comment="nodejs10-docs-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602675" comment="nodejs8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602676" comment="nodejs8-devel-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602677" comment="nodejs8-docs-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602674" comment="npm10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602678" comment="npm8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603114" comment="python3-nghttp2-1.39.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267108" comment="python3-nghttp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602681" comment="vim-plugin-nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173966" comment="vim-plugin-nginx is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9514</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514</cve>
	<bugzilla href="https://bugzilla.suse.com/1145662">SUSE bug 1145662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145663">SUSE bug 1145663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146095">SUSE bug 1146095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146115">SUSE bug 1146115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147142">SUSE bug 1147142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602650" comment="go1.11-1.11.13-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242156" comment="go1.11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602651" comment="go1.11-doc-1.11.13-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242158" comment="go1.11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602652" comment="go1.11-race-1.11.13-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242160" comment="go1.11-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602709" comment="go1.12-1.12.9-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256067" comment="go1.12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602710" comment="go1.12-doc-1.12.9-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256068" comment="go1.12-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602711" comment="go1.12-race-1.12.9-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256069" comment="go1.12-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602671" comment="nodejs10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602672" comment="nodejs10-devel-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602673" comment="nodejs10-docs-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602675" comment="nodejs8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602676" comment="nodejs8-devel-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602677" comment="nodejs8-docs-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602674" comment="npm10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602678" comment="npm8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9515</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515</cve>
	<bugzilla href="https://bugzilla.suse.com/1145663">SUSE bug 1145663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146100">SUSE bug 1146100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602671" comment="nodejs10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602672" comment="nodejs10-devel-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602673" comment="nodejs10-docs-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602675" comment="nodejs8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602676" comment="nodejs8-devel-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602677" comment="nodejs8-docs-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602674" comment="npm10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602678" comment="npm8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9516</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9516" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516</cve>
	<bugzilla href="https://bugzilla.suse.com/1145582">SUSE bug 1145582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146090">SUSE bug 1146090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193427">SUSE bug 1193427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602679" comment="nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153280" comment="nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602680" comment="nginx-source-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266795" comment="nginx-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602671" comment="nodejs10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602672" comment="nodejs10-devel-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602673" comment="nodejs10-docs-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602675" comment="nodejs8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602676" comment="nodejs8-devel-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602677" comment="nodejs8-docs-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602674" comment="npm10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602678" comment="npm8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602681" comment="vim-plugin-nginx-1.14.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173966" comment="vim-plugin-nginx is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<bugzilla href="https://bugzilla.suse.com/1145575">SUSE bug 1145575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146097">SUSE bug 1146097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602583" comment="apache2-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602584" comment="apache2-devel-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602585" comment="apache2-doc-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602586" comment="apache2-event-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602587" comment="apache2-example-pages-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602588" comment="apache2-prefork-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602589" comment="apache2-utils-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602590" comment="apache2-worker-2.4.33-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602671" comment="nodejs10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602672" comment="nodejs10-devel-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602673" comment="nodejs10-docs-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602675" comment="nodejs8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602676" comment="nodejs8-devel-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602677" comment="nodejs8-docs-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602674" comment="npm10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602678" comment="npm8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9518</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518</cve>
	<bugzilla href="https://bugzilla.suse.com/1145662">SUSE bug 1145662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145663">SUSE bug 1145663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146093">SUSE bug 1146093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602671" comment="nodejs10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602672" comment="nodejs10-devel-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602673" comment="nodejs10-docs-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602675" comment="nodejs8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602676" comment="nodejs8-devel-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602677" comment="nodejs8-docs-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602674" comment="npm10-10.16.3-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602678" comment="npm8-8.16.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9578</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9578" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9578" ref_url="https://www.suse.com/security/cve/CVE-2019-9578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRDOETNQVM5LVLJRZMNGQEBNRFW4ZWEV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6NOI7O3I53SFL6DVLZH5VWF6EO4AISA/" source="SUSE-SU"/>
    <description>
    In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9578/">CVE-2019-9578</cve>
	<bugzilla href="https://bugzilla.suse.com/1128140">SUSE bug 1128140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601667" comment="libu2f-host-devel-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244552" comment="libu2f-host-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601668" comment="libu2f-host-doc-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244553" comment="libu2f-host-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601669" comment="libu2f-host0-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244554" comment="libu2f-host0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601670" comment="pam_u2f-1.0.8-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260150" comment="pam_u2f is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601671" comment="u2f-host-1.1.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244555" comment="u2f-host is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9636</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9637</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637</cve>
	<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9638</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note-&gt;offset relationship to value_len.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638</cve>
	<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9639</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639</cve>
	<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9640</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640</cve>
	<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9641</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641</cve>
	<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html" source="SUSE-SU"/>
    <description>
    Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608062" comment="libpython2_7-1_0-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608063" comment="libpython2_7-1_0-32bit-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606967" comment="libpython3_6m1_0-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606968" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608064" comment="python-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608065" comment="python-32bit-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608066" comment="python-base-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608067" comment="python-base-32bit-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608068" comment="python-curses-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608069" comment="python-demo-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608070" comment="python-devel-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608071" comment="python-doc-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608072" comment="python-doc-pdf-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608073" comment="python-gdbm-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608074" comment="python-idle-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608075" comment="python-tk-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608076" comment="python-xml-2.7.17-lp151.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606969" comment="python3-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606970" comment="python3-32bit-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606971" comment="python3-base-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606972" comment="python3-base-32bit-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606973" comment="python3-curses-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606974" comment="python3-dbm-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606975" comment="python3-devel-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606976" comment="python3-idle-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606977" comment="python3-testsuite-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606978" comment="python3-tk-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606979" comment="python3-tools-3.6.10-lp151.6.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9675</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9675" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675</cve>
	<bugzilla href="https://bugzilla.suse.com/1128886">SUSE bug 1128886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601469" comment="apache2-mod_php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601470" comment="php7-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601471" comment="php7-bcmath-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601472" comment="php7-bz2-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601473" comment="php7-calendar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601474" comment="php7-ctype-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601475" comment="php7-curl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601476" comment="php7-dba-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601477" comment="php7-devel-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601478" comment="php7-dom-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601479" comment="php7-embed-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601480" comment="php7-enchant-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601481" comment="php7-exif-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601482" comment="php7-fastcgi-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601483" comment="php7-fileinfo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601484" comment="php7-firebird-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601485" comment="php7-fpm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601486" comment="php7-ftp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601487" comment="php7-gd-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601488" comment="php7-gettext-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601489" comment="php7-gmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601490" comment="php7-iconv-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601491" comment="php7-intl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601492" comment="php7-json-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601493" comment="php7-ldap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601494" comment="php7-mbstring-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601495" comment="php7-mysql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601496" comment="php7-odbc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601497" comment="php7-opcache-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601498" comment="php7-openssl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601499" comment="php7-pcntl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601500" comment="php7-pdo-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601501" comment="php7-pear-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601502" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601503" comment="php7-pgsql-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601504" comment="php7-phar-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601505" comment="php7-posix-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601506" comment="php7-readline-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601507" comment="php7-shmop-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601508" comment="php7-snmp-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601509" comment="php7-soap-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601510" comment="php7-sockets-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601511" comment="php7-sodium-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601512" comment="php7-sqlite-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601513" comment="php7-sysvmsg-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601514" comment="php7-sysvsem-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601515" comment="php7-sysvshm-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601516" comment="php7-testresults-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009257401" comment="php7-testresults is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601517" comment="php7-tidy-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601518" comment="php7-tokenizer-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601519" comment="php7-wddx-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601520" comment="php7-xmlreader-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601521" comment="php7-xmlrpc-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601522" comment="php7-xmlwriter-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601523" comment="php7-xsl-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601524" comment="php7-zip-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601525" comment="php7-zlib-7.2.5-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9704" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1389-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Vixie Cron before the 3.0pl1-133 Debian package allows local users to cause a denial of service (daemon crash) via a large crontab file because the calloc return value is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704</cve>
	<bugzilla href="https://bugzilla.suse.com/1128937">SUSE bug 1128937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187508">SUSE bug 1187508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601405" comment="cron-4.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151016" comment="cron is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601406" comment="cronie-1.5.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151017" comment="cronie is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601407" comment="cronie-anacron-1.5.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256137" comment="cronie-anacron is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9705" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1389-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Vixie Cron before the 3.0pl1-133 Debian package allows local users to cause a denial of service (memory consumption) via a large crontab file because an unlimited number of lines is accepted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705</cve>
	<bugzilla href="https://bugzilla.suse.com/1128935">SUSE bug 1128935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187508">SUSE bug 1187508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601405" comment="cron-4.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151016" comment="cron is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601406" comment="cronie-1.5.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151017" comment="cronie is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601407" comment="cronie-anacron-1.5.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256137" comment="cronie-anacron is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9740</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740</cve>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602712" comment="python2-urllib3-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009264573" comment="python2-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602713" comment="python2-urllib3-test-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266833" comment="python2-urllib3-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602714" comment="python3-urllib3-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602715" comment="python3-urllib3-test-1.24-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266834" comment="python3-urllib3-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9752" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9752" ref_url="https://www.suse.com/security/cve/CVE-2019-9752" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 5.x before 5.0.34, 6.x before 6.0.16, and 7.x before 7.0.4. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. This is related to Content-type mishandling in Kernel/Modules/PictureUpload.pm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9752/">CVE-2019-9752</cve>
	<bugzilla href="https://bugzilla.suse.com/1122560">SUSE bug 1122560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129756">SUSE bug 1129756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9770</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9770" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9770" ref_url="https://www.suse.com/security/cve/CVE-2019-9770" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer overflow in the function dwg_decode_eed_data at decode.c for the y dimension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-9770/">CVE-2019-9770</cve>
	<bugzilla href="https://bugzilla.suse.com/1129881">SUSE bug 1129881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9771" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9771" ref_url="https://www.suse.com/security/cve/CVE-2019-9771" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function bit_convert_TU at bits.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9771/">CVE-2019-9771</cve>
	<bugzilla href="https://bugzilla.suse.com/1129876">SUSE bug 1129876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9772</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9772" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9772" ref_url="https://www.suse.com/security/cve/CVE-2019-9772" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function dwg_dxf_LEADER at dwg.spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9772/">CVE-2019-9772</cve>
	<bugzilla href="https://bugzilla.suse.com/1129875">SUSE bug 1129875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9773</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9773" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9773" ref_url="https://www.suse.com/security/cve/CVE-2019-9773" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer overflow in the function dwg_decode_eed_data at decode.c for the z dimension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9773/">CVE-2019-9773</cve>
	<bugzilla href="https://bugzilla.suse.com/1129874">SUSE bug 1129874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9774</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9774" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9774" ref_url="https://www.suse.com/security/cve/CVE-2019-9774" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is an out-of-bounds read in the function bit_read_B at bits.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9774/">CVE-2019-9774</cve>
	<bugzilla href="https://bugzilla.suse.com/1129879">SUSE bug 1129879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9775</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9775" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9775" ref_url="https://www.suse.com/security/cve/CVE-2019-9775" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is an out-of-bounds read in the function dwg_dxf_BLOCK_CONTROL at dwg.spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9775/">CVE-2019-9775</cve>
	<bugzilla href="https://bugzilla.suse.com/1129878">SUSE bug 1129878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9776</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9776" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9776" ref_url="https://www.suse.com/security/cve/CVE-2019-9776" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function dwg_dxf_LTYPE at dwg.spec (later than CVE-2019-9779).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9776/">CVE-2019-9776</cve>
	<bugzilla href="https://bugzilla.suse.com/1129868">SUSE bug 1129868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129873">SUSE bug 1129873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9777</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9777" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9777" ref_url="https://www.suse.com/security/cve/CVE-2019-9777" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer over-read in the function dxf_header_write at header_variables_dxf.spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9777/">CVE-2019-9777</cve>
	<bugzilla href="https://bugzilla.suse.com/1129870">SUSE bug 1129870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9778</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9778" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9778" ref_url="https://www.suse.com/security/cve/CVE-2019-9778" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer over-read in the function dwg_dxf_LTYPE at dwg.spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9778/">CVE-2019-9778</cve>
	<bugzilla href="https://bugzilla.suse.com/1129869">SUSE bug 1129869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9779</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9779" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9779" ref_url="https://www.suse.com/security/cve/CVE-2019-9779" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function dwg_dxf_LTYPE at dwg.spec (earlier than CVE-2019-9776).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9779/">CVE-2019-9779</cve>
	<bugzilla href="https://bugzilla.suse.com/1129868">SUSE bug 1129868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129873">SUSE bug 1129873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608026" comment="libredwg-devel-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608027" comment="libredwg-tools-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608028" comment="libredwg0-0.9.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9811</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602004" comment="MozillaThunderbird-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602005" comment="MozillaThunderbird-buildsymbols-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152803" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602006" comment="MozillaThunderbird-translations-common-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602007" comment="MozillaThunderbird-translations-other-60.8.0-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601954" comment="libfreebl3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601955" comment="libfreebl3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601956" comment="libfreebl3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601957" comment="libfreebl3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601958" comment="libsoftokn3-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601959" comment="libsoftokn3-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601960" comment="libsoftokn3-hmac-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601961" comment="libsoftokn3-hmac-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601962" comment="mozilla-nss-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601963" comment="mozilla-nss-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601964" comment="mozilla-nss-certs-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601965" comment="mozilla-nss-certs-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601966" comment="mozilla-nss-devel-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601967" comment="mozilla-nss-sysinit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601968" comment="mozilla-nss-sysinit-32bit-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601969" comment="mozilla-nss-tools-3.44.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR &lt; 60.9, Firefox ESR &lt; 68.1, and Firefox &lt; 69.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603137" comment="MozillaFirefox-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603138" comment="MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603139" comment="MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603140" comment="MozillaFirefox-devel-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603141" comment="MozillaFirefox-translations-common-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603142" comment="MozillaFirefox-translations-other-68.1.0-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9836</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9836" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00032.html" source="SUSE-SU"/>
    <description>
    Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836</cve>
	<bugzilla href="https://bugzilla.suse.com/1139383">SUSE bug 1139383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601856" comment="kernel-firmware-20190618-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167632" comment="kernel-firmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009601857" comment="ucode-amd-20190618-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9848</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9848" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9848" ref_url="https://www.suse.com/security/cve/CVE-2019-9848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9848/">CVE-2019-9848</cve>
	<bugzilla href="https://bugzilla.suse.com/1141862">SUSE bug 1141862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146098">SUSE bug 1146098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146105">SUSE bug 1146105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602873" comment="libreoffice-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602874" comment="libreoffice-base-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602875" comment="libreoffice-base-drivers-firebird-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602876" comment="libreoffice-base-drivers-postgresql-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602877" comment="libreoffice-branding-upstream-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602878" comment="libreoffice-calc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602879" comment="libreoffice-calc-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602880" comment="libreoffice-draw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602881" comment="libreoffice-filters-optional-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602882" comment="libreoffice-gdb-pretty-printers-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602883" comment="libreoffice-glade-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602884" comment="libreoffice-gnome-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602885" comment="libreoffice-gtk2-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176159" comment="libreoffice-gtk2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602886" comment="libreoffice-gtk3-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602887" comment="libreoffice-icon-themes-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602888" comment="libreoffice-impress-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602889" comment="libreoffice-l10n-af-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602890" comment="libreoffice-l10n-am-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602891" comment="libreoffice-l10n-ar-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602892" comment="libreoffice-l10n-as-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602893" comment="libreoffice-l10n-ast-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602894" comment="libreoffice-l10n-be-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602895" comment="libreoffice-l10n-bg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602896" comment="libreoffice-l10n-bn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602897" comment="libreoffice-l10n-bn_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602898" comment="libreoffice-l10n-bo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602899" comment="libreoffice-l10n-br-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602900" comment="libreoffice-l10n-brx-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602901" comment="libreoffice-l10n-bs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602902" comment="libreoffice-l10n-ca-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602903" comment="libreoffice-l10n-ca_valencia-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602904" comment="libreoffice-l10n-cs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602905" comment="libreoffice-l10n-cy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602906" comment="libreoffice-l10n-da-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602907" comment="libreoffice-l10n-de-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602908" comment="libreoffice-l10n-dgo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602909" comment="libreoffice-l10n-dsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602910" comment="libreoffice-l10n-dz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602911" comment="libreoffice-l10n-el-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602912" comment="libreoffice-l10n-en-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602913" comment="libreoffice-l10n-en_GB-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602914" comment="libreoffice-l10n-en_ZA-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602915" comment="libreoffice-l10n-eo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602916" comment="libreoffice-l10n-es-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602917" comment="libreoffice-l10n-et-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602918" comment="libreoffice-l10n-eu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602919" comment="libreoffice-l10n-fa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602920" comment="libreoffice-l10n-fi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602921" comment="libreoffice-l10n-fr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602922" comment="libreoffice-l10n-fy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602923" comment="libreoffice-l10n-ga-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602924" comment="libreoffice-l10n-gd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602925" comment="libreoffice-l10n-gl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602926" comment="libreoffice-l10n-gu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602927" comment="libreoffice-l10n-gug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602928" comment="libreoffice-l10n-he-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602929" comment="libreoffice-l10n-hi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602930" comment="libreoffice-l10n-hr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602931" comment="libreoffice-l10n-hsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602932" comment="libreoffice-l10n-hu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602933" comment="libreoffice-l10n-id-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602934" comment="libreoffice-l10n-is-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602935" comment="libreoffice-l10n-it-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602936" comment="libreoffice-l10n-ja-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602937" comment="libreoffice-l10n-ka-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602938" comment="libreoffice-l10n-kab-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602939" comment="libreoffice-l10n-kk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602940" comment="libreoffice-l10n-km-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602941" comment="libreoffice-l10n-kmr_Latn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602942" comment="libreoffice-l10n-kn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602943" comment="libreoffice-l10n-ko-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602944" comment="libreoffice-l10n-kok-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602945" comment="libreoffice-l10n-ks-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602946" comment="libreoffice-l10n-lb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602947" comment="libreoffice-l10n-lo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602948" comment="libreoffice-l10n-lt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602949" comment="libreoffice-l10n-lv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602950" comment="libreoffice-l10n-mai-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602951" comment="libreoffice-l10n-mk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602952" comment="libreoffice-l10n-ml-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602953" comment="libreoffice-l10n-mn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602954" comment="libreoffice-l10n-mni-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602955" comment="libreoffice-l10n-mr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602956" comment="libreoffice-l10n-my-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602957" comment="libreoffice-l10n-nb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602958" comment="libreoffice-l10n-ne-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602959" comment="libreoffice-l10n-nl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602960" comment="libreoffice-l10n-nn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602961" comment="libreoffice-l10n-nr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602962" comment="libreoffice-l10n-nso-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602963" comment="libreoffice-l10n-oc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602964" comment="libreoffice-l10n-om-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602965" comment="libreoffice-l10n-or-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602966" comment="libreoffice-l10n-pa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602967" comment="libreoffice-l10n-pl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602968" comment="libreoffice-l10n-pt_BR-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602969" comment="libreoffice-l10n-pt_PT-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602970" comment="libreoffice-l10n-ro-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602971" comment="libreoffice-l10n-ru-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602972" comment="libreoffice-l10n-rw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602973" comment="libreoffice-l10n-sa_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602974" comment="libreoffice-l10n-sat-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602975" comment="libreoffice-l10n-sd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602976" comment="libreoffice-l10n-si-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602977" comment="libreoffice-l10n-sid-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602978" comment="libreoffice-l10n-sk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602979" comment="libreoffice-l10n-sl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602980" comment="libreoffice-l10n-sq-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602981" comment="libreoffice-l10n-sr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602982" comment="libreoffice-l10n-ss-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602983" comment="libreoffice-l10n-st-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602984" comment="libreoffice-l10n-sv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602985" comment="libreoffice-l10n-sw_TZ-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602986" comment="libreoffice-l10n-ta-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602987" comment="libreoffice-l10n-te-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602988" comment="libreoffice-l10n-tg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602989" comment="libreoffice-l10n-th-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602990" comment="libreoffice-l10n-tn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602991" comment="libreoffice-l10n-tr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602992" comment="libreoffice-l10n-ts-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602993" comment="libreoffice-l10n-tt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602994" comment="libreoffice-l10n-ug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602995" comment="libreoffice-l10n-uk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602996" comment="libreoffice-l10n-uz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602997" comment="libreoffice-l10n-ve-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602998" comment="libreoffice-l10n-vec-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602999" comment="libreoffice-l10n-vi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603000" comment="libreoffice-l10n-xh-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603001" comment="libreoffice-l10n-zh_CN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603002" comment="libreoffice-l10n-zh_TW-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603003" comment="libreoffice-l10n-zu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603004" comment="libreoffice-mailmerge-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603005" comment="libreoffice-math-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603006" comment="libreoffice-officebean-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603007" comment="libreoffice-pyuno-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603008" comment="libreoffice-qt5-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603009" comment="libreoffice-sdk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603010" comment="libreoffice-sdk-doc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603011" comment="libreoffice-writer-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603012" comment="libreoffice-writer-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603013" comment="libreofficekit-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603014" comment="libreofficekit-devel-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9849</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9849" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9849" ref_url="https://www.suse.com/security/cve/CVE-2019-9849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9849/">CVE-2019-9849</cve>
	<bugzilla href="https://bugzilla.suse.com/1141861">SUSE bug 1141861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602873" comment="libreoffice-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602874" comment="libreoffice-base-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602875" comment="libreoffice-base-drivers-firebird-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602876" comment="libreoffice-base-drivers-postgresql-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602877" comment="libreoffice-branding-upstream-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602878" comment="libreoffice-calc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602879" comment="libreoffice-calc-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602880" comment="libreoffice-draw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602881" comment="libreoffice-filters-optional-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602882" comment="libreoffice-gdb-pretty-printers-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602883" comment="libreoffice-glade-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602884" comment="libreoffice-gnome-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602885" comment="libreoffice-gtk2-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176159" comment="libreoffice-gtk2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602886" comment="libreoffice-gtk3-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602887" comment="libreoffice-icon-themes-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602888" comment="libreoffice-impress-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602889" comment="libreoffice-l10n-af-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602890" comment="libreoffice-l10n-am-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602891" comment="libreoffice-l10n-ar-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602892" comment="libreoffice-l10n-as-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602893" comment="libreoffice-l10n-ast-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602894" comment="libreoffice-l10n-be-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602895" comment="libreoffice-l10n-bg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602896" comment="libreoffice-l10n-bn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602897" comment="libreoffice-l10n-bn_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602898" comment="libreoffice-l10n-bo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602899" comment="libreoffice-l10n-br-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602900" comment="libreoffice-l10n-brx-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602901" comment="libreoffice-l10n-bs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602902" comment="libreoffice-l10n-ca-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602903" comment="libreoffice-l10n-ca_valencia-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602904" comment="libreoffice-l10n-cs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602905" comment="libreoffice-l10n-cy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602906" comment="libreoffice-l10n-da-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602907" comment="libreoffice-l10n-de-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602908" comment="libreoffice-l10n-dgo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602909" comment="libreoffice-l10n-dsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602910" comment="libreoffice-l10n-dz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602911" comment="libreoffice-l10n-el-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602912" comment="libreoffice-l10n-en-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602913" comment="libreoffice-l10n-en_GB-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602914" comment="libreoffice-l10n-en_ZA-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602915" comment="libreoffice-l10n-eo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602916" comment="libreoffice-l10n-es-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602917" comment="libreoffice-l10n-et-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602918" comment="libreoffice-l10n-eu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602919" comment="libreoffice-l10n-fa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602920" comment="libreoffice-l10n-fi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602921" comment="libreoffice-l10n-fr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602922" comment="libreoffice-l10n-fy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602923" comment="libreoffice-l10n-ga-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602924" comment="libreoffice-l10n-gd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602925" comment="libreoffice-l10n-gl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602926" comment="libreoffice-l10n-gu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602927" comment="libreoffice-l10n-gug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602928" comment="libreoffice-l10n-he-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602929" comment="libreoffice-l10n-hi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602930" comment="libreoffice-l10n-hr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602931" comment="libreoffice-l10n-hsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602932" comment="libreoffice-l10n-hu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602933" comment="libreoffice-l10n-id-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602934" comment="libreoffice-l10n-is-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602935" comment="libreoffice-l10n-it-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602936" comment="libreoffice-l10n-ja-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602937" comment="libreoffice-l10n-ka-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602938" comment="libreoffice-l10n-kab-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602939" comment="libreoffice-l10n-kk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602940" comment="libreoffice-l10n-km-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602941" comment="libreoffice-l10n-kmr_Latn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602942" comment="libreoffice-l10n-kn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602943" comment="libreoffice-l10n-ko-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602944" comment="libreoffice-l10n-kok-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602945" comment="libreoffice-l10n-ks-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602946" comment="libreoffice-l10n-lb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602947" comment="libreoffice-l10n-lo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602948" comment="libreoffice-l10n-lt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602949" comment="libreoffice-l10n-lv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602950" comment="libreoffice-l10n-mai-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602951" comment="libreoffice-l10n-mk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602952" comment="libreoffice-l10n-ml-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602953" comment="libreoffice-l10n-mn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602954" comment="libreoffice-l10n-mni-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602955" comment="libreoffice-l10n-mr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602956" comment="libreoffice-l10n-my-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602957" comment="libreoffice-l10n-nb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602958" comment="libreoffice-l10n-ne-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602959" comment="libreoffice-l10n-nl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602960" comment="libreoffice-l10n-nn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602961" comment="libreoffice-l10n-nr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602962" comment="libreoffice-l10n-nso-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602963" comment="libreoffice-l10n-oc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602964" comment="libreoffice-l10n-om-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602965" comment="libreoffice-l10n-or-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602966" comment="libreoffice-l10n-pa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602967" comment="libreoffice-l10n-pl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602968" comment="libreoffice-l10n-pt_BR-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602969" comment="libreoffice-l10n-pt_PT-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602970" comment="libreoffice-l10n-ro-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602971" comment="libreoffice-l10n-ru-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602972" comment="libreoffice-l10n-rw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602973" comment="libreoffice-l10n-sa_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602974" comment="libreoffice-l10n-sat-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602975" comment="libreoffice-l10n-sd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602976" comment="libreoffice-l10n-si-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602977" comment="libreoffice-l10n-sid-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602978" comment="libreoffice-l10n-sk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602979" comment="libreoffice-l10n-sl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602980" comment="libreoffice-l10n-sq-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602981" comment="libreoffice-l10n-sr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602982" comment="libreoffice-l10n-ss-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602983" comment="libreoffice-l10n-st-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602984" comment="libreoffice-l10n-sv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602985" comment="libreoffice-l10n-sw_TZ-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602986" comment="libreoffice-l10n-ta-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602987" comment="libreoffice-l10n-te-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602988" comment="libreoffice-l10n-tg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602989" comment="libreoffice-l10n-th-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602990" comment="libreoffice-l10n-tn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602991" comment="libreoffice-l10n-tr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602992" comment="libreoffice-l10n-ts-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602993" comment="libreoffice-l10n-tt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602994" comment="libreoffice-l10n-ug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602995" comment="libreoffice-l10n-uk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602996" comment="libreoffice-l10n-uz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602997" comment="libreoffice-l10n-ve-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602998" comment="libreoffice-l10n-vec-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602999" comment="libreoffice-l10n-vi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603000" comment="libreoffice-l10n-xh-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603001" comment="libreoffice-l10n-zh_CN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603002" comment="libreoffice-l10n-zh_TW-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603003" comment="libreoffice-l10n-zu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603004" comment="libreoffice-mailmerge-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603005" comment="libreoffice-math-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603006" comment="libreoffice-officebean-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603007" comment="libreoffice-pyuno-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603008" comment="libreoffice-qt5-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603009" comment="libreoffice-sdk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603010" comment="libreoffice-sdk-doc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603011" comment="libreoffice-writer-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603012" comment="libreoffice-writer-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603013" comment="libreofficekit-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603014" comment="libreofficekit-devel-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9850</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9850" ref_url="https://www.suse.com/security/cve/CVE-2019-9850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9850/">CVE-2019-9850</cve>
	<bugzilla href="https://bugzilla.suse.com/1146098">SUSE bug 1146098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602873" comment="libreoffice-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602874" comment="libreoffice-base-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602875" comment="libreoffice-base-drivers-firebird-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602876" comment="libreoffice-base-drivers-postgresql-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602877" comment="libreoffice-branding-upstream-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602878" comment="libreoffice-calc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602879" comment="libreoffice-calc-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602880" comment="libreoffice-draw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602881" comment="libreoffice-filters-optional-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602882" comment="libreoffice-gdb-pretty-printers-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602883" comment="libreoffice-glade-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602884" comment="libreoffice-gnome-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602885" comment="libreoffice-gtk2-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176159" comment="libreoffice-gtk2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602886" comment="libreoffice-gtk3-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602887" comment="libreoffice-icon-themes-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602888" comment="libreoffice-impress-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602889" comment="libreoffice-l10n-af-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602890" comment="libreoffice-l10n-am-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602891" comment="libreoffice-l10n-ar-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602892" comment="libreoffice-l10n-as-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602893" comment="libreoffice-l10n-ast-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602894" comment="libreoffice-l10n-be-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602895" comment="libreoffice-l10n-bg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602896" comment="libreoffice-l10n-bn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602897" comment="libreoffice-l10n-bn_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602898" comment="libreoffice-l10n-bo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602899" comment="libreoffice-l10n-br-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602900" comment="libreoffice-l10n-brx-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602901" comment="libreoffice-l10n-bs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602902" comment="libreoffice-l10n-ca-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602903" comment="libreoffice-l10n-ca_valencia-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602904" comment="libreoffice-l10n-cs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602905" comment="libreoffice-l10n-cy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602906" comment="libreoffice-l10n-da-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602907" comment="libreoffice-l10n-de-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602908" comment="libreoffice-l10n-dgo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602909" comment="libreoffice-l10n-dsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602910" comment="libreoffice-l10n-dz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602911" comment="libreoffice-l10n-el-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602912" comment="libreoffice-l10n-en-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602913" comment="libreoffice-l10n-en_GB-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602914" comment="libreoffice-l10n-en_ZA-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602915" comment="libreoffice-l10n-eo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602916" comment="libreoffice-l10n-es-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602917" comment="libreoffice-l10n-et-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602918" comment="libreoffice-l10n-eu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602919" comment="libreoffice-l10n-fa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602920" comment="libreoffice-l10n-fi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602921" comment="libreoffice-l10n-fr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602922" comment="libreoffice-l10n-fy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602923" comment="libreoffice-l10n-ga-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602924" comment="libreoffice-l10n-gd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602925" comment="libreoffice-l10n-gl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602926" comment="libreoffice-l10n-gu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602927" comment="libreoffice-l10n-gug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602928" comment="libreoffice-l10n-he-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602929" comment="libreoffice-l10n-hi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602930" comment="libreoffice-l10n-hr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602931" comment="libreoffice-l10n-hsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602932" comment="libreoffice-l10n-hu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602933" comment="libreoffice-l10n-id-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602934" comment="libreoffice-l10n-is-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602935" comment="libreoffice-l10n-it-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602936" comment="libreoffice-l10n-ja-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602937" comment="libreoffice-l10n-ka-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602938" comment="libreoffice-l10n-kab-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602939" comment="libreoffice-l10n-kk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602940" comment="libreoffice-l10n-km-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602941" comment="libreoffice-l10n-kmr_Latn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602942" comment="libreoffice-l10n-kn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602943" comment="libreoffice-l10n-ko-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602944" comment="libreoffice-l10n-kok-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602945" comment="libreoffice-l10n-ks-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602946" comment="libreoffice-l10n-lb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602947" comment="libreoffice-l10n-lo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602948" comment="libreoffice-l10n-lt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602949" comment="libreoffice-l10n-lv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602950" comment="libreoffice-l10n-mai-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602951" comment="libreoffice-l10n-mk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602952" comment="libreoffice-l10n-ml-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602953" comment="libreoffice-l10n-mn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602954" comment="libreoffice-l10n-mni-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602955" comment="libreoffice-l10n-mr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602956" comment="libreoffice-l10n-my-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602957" comment="libreoffice-l10n-nb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602958" comment="libreoffice-l10n-ne-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602959" comment="libreoffice-l10n-nl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602960" comment="libreoffice-l10n-nn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602961" comment="libreoffice-l10n-nr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602962" comment="libreoffice-l10n-nso-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602963" comment="libreoffice-l10n-oc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602964" comment="libreoffice-l10n-om-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602965" comment="libreoffice-l10n-or-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602966" comment="libreoffice-l10n-pa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602967" comment="libreoffice-l10n-pl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602968" comment="libreoffice-l10n-pt_BR-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602969" comment="libreoffice-l10n-pt_PT-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602970" comment="libreoffice-l10n-ro-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602971" comment="libreoffice-l10n-ru-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602972" comment="libreoffice-l10n-rw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602973" comment="libreoffice-l10n-sa_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602974" comment="libreoffice-l10n-sat-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602975" comment="libreoffice-l10n-sd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602976" comment="libreoffice-l10n-si-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602977" comment="libreoffice-l10n-sid-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602978" comment="libreoffice-l10n-sk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602979" comment="libreoffice-l10n-sl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602980" comment="libreoffice-l10n-sq-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602981" comment="libreoffice-l10n-sr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602982" comment="libreoffice-l10n-ss-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602983" comment="libreoffice-l10n-st-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602984" comment="libreoffice-l10n-sv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602985" comment="libreoffice-l10n-sw_TZ-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602986" comment="libreoffice-l10n-ta-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602987" comment="libreoffice-l10n-te-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602988" comment="libreoffice-l10n-tg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602989" comment="libreoffice-l10n-th-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602990" comment="libreoffice-l10n-tn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602991" comment="libreoffice-l10n-tr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602992" comment="libreoffice-l10n-ts-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602993" comment="libreoffice-l10n-tt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602994" comment="libreoffice-l10n-ug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602995" comment="libreoffice-l10n-uk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602996" comment="libreoffice-l10n-uz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602997" comment="libreoffice-l10n-ve-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602998" comment="libreoffice-l10n-vec-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602999" comment="libreoffice-l10n-vi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603000" comment="libreoffice-l10n-xh-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603001" comment="libreoffice-l10n-zh_CN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603002" comment="libreoffice-l10n-zh_TW-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603003" comment="libreoffice-l10n-zu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603004" comment="libreoffice-mailmerge-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603005" comment="libreoffice-math-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603006" comment="libreoffice-officebean-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603007" comment="libreoffice-pyuno-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603008" comment="libreoffice-qt5-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603009" comment="libreoffice-sdk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603010" comment="libreoffice-sdk-doc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603011" comment="libreoffice-writer-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603012" comment="libreoffice-writer-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603013" comment="libreofficekit-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603014" comment="libreofficekit-devel-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9851</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9851" ref_url="https://www.suse.com/security/cve/CVE-2019-9851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9851/">CVE-2019-9851</cve>
	<bugzilla href="https://bugzilla.suse.com/1146105">SUSE bug 1146105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602873" comment="libreoffice-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602874" comment="libreoffice-base-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602875" comment="libreoffice-base-drivers-firebird-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602876" comment="libreoffice-base-drivers-postgresql-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602877" comment="libreoffice-branding-upstream-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602878" comment="libreoffice-calc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602879" comment="libreoffice-calc-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602880" comment="libreoffice-draw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602881" comment="libreoffice-filters-optional-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602882" comment="libreoffice-gdb-pretty-printers-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602883" comment="libreoffice-glade-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602884" comment="libreoffice-gnome-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602885" comment="libreoffice-gtk2-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176159" comment="libreoffice-gtk2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602886" comment="libreoffice-gtk3-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602887" comment="libreoffice-icon-themes-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602888" comment="libreoffice-impress-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602889" comment="libreoffice-l10n-af-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602890" comment="libreoffice-l10n-am-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602891" comment="libreoffice-l10n-ar-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602892" comment="libreoffice-l10n-as-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602893" comment="libreoffice-l10n-ast-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602894" comment="libreoffice-l10n-be-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602895" comment="libreoffice-l10n-bg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602896" comment="libreoffice-l10n-bn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602897" comment="libreoffice-l10n-bn_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602898" comment="libreoffice-l10n-bo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602899" comment="libreoffice-l10n-br-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602900" comment="libreoffice-l10n-brx-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602901" comment="libreoffice-l10n-bs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602902" comment="libreoffice-l10n-ca-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602903" comment="libreoffice-l10n-ca_valencia-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602904" comment="libreoffice-l10n-cs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602905" comment="libreoffice-l10n-cy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602906" comment="libreoffice-l10n-da-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602907" comment="libreoffice-l10n-de-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602908" comment="libreoffice-l10n-dgo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602909" comment="libreoffice-l10n-dsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602910" comment="libreoffice-l10n-dz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602911" comment="libreoffice-l10n-el-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602912" comment="libreoffice-l10n-en-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602913" comment="libreoffice-l10n-en_GB-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602914" comment="libreoffice-l10n-en_ZA-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602915" comment="libreoffice-l10n-eo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602916" comment="libreoffice-l10n-es-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602917" comment="libreoffice-l10n-et-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602918" comment="libreoffice-l10n-eu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602919" comment="libreoffice-l10n-fa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602920" comment="libreoffice-l10n-fi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602921" comment="libreoffice-l10n-fr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602922" comment="libreoffice-l10n-fy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602923" comment="libreoffice-l10n-ga-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602924" comment="libreoffice-l10n-gd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602925" comment="libreoffice-l10n-gl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602926" comment="libreoffice-l10n-gu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602927" comment="libreoffice-l10n-gug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602928" comment="libreoffice-l10n-he-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602929" comment="libreoffice-l10n-hi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602930" comment="libreoffice-l10n-hr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602931" comment="libreoffice-l10n-hsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602932" comment="libreoffice-l10n-hu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602933" comment="libreoffice-l10n-id-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602934" comment="libreoffice-l10n-is-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602935" comment="libreoffice-l10n-it-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602936" comment="libreoffice-l10n-ja-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602937" comment="libreoffice-l10n-ka-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602938" comment="libreoffice-l10n-kab-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602939" comment="libreoffice-l10n-kk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602940" comment="libreoffice-l10n-km-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602941" comment="libreoffice-l10n-kmr_Latn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602942" comment="libreoffice-l10n-kn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602943" comment="libreoffice-l10n-ko-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602944" comment="libreoffice-l10n-kok-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602945" comment="libreoffice-l10n-ks-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602946" comment="libreoffice-l10n-lb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602947" comment="libreoffice-l10n-lo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602948" comment="libreoffice-l10n-lt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602949" comment="libreoffice-l10n-lv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602950" comment="libreoffice-l10n-mai-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602951" comment="libreoffice-l10n-mk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602952" comment="libreoffice-l10n-ml-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602953" comment="libreoffice-l10n-mn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602954" comment="libreoffice-l10n-mni-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602955" comment="libreoffice-l10n-mr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602956" comment="libreoffice-l10n-my-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602957" comment="libreoffice-l10n-nb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602958" comment="libreoffice-l10n-ne-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602959" comment="libreoffice-l10n-nl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602960" comment="libreoffice-l10n-nn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602961" comment="libreoffice-l10n-nr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602962" comment="libreoffice-l10n-nso-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602963" comment="libreoffice-l10n-oc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602964" comment="libreoffice-l10n-om-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602965" comment="libreoffice-l10n-or-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602966" comment="libreoffice-l10n-pa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602967" comment="libreoffice-l10n-pl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602968" comment="libreoffice-l10n-pt_BR-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602969" comment="libreoffice-l10n-pt_PT-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602970" comment="libreoffice-l10n-ro-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602971" comment="libreoffice-l10n-ru-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602972" comment="libreoffice-l10n-rw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602973" comment="libreoffice-l10n-sa_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602974" comment="libreoffice-l10n-sat-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602975" comment="libreoffice-l10n-sd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602976" comment="libreoffice-l10n-si-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602977" comment="libreoffice-l10n-sid-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602978" comment="libreoffice-l10n-sk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602979" comment="libreoffice-l10n-sl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602980" comment="libreoffice-l10n-sq-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602981" comment="libreoffice-l10n-sr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602982" comment="libreoffice-l10n-ss-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602983" comment="libreoffice-l10n-st-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602984" comment="libreoffice-l10n-sv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602985" comment="libreoffice-l10n-sw_TZ-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602986" comment="libreoffice-l10n-ta-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602987" comment="libreoffice-l10n-te-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602988" comment="libreoffice-l10n-tg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602989" comment="libreoffice-l10n-th-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602990" comment="libreoffice-l10n-tn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602991" comment="libreoffice-l10n-tr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602992" comment="libreoffice-l10n-ts-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602993" comment="libreoffice-l10n-tt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602994" comment="libreoffice-l10n-ug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602995" comment="libreoffice-l10n-uk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602996" comment="libreoffice-l10n-uz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602997" comment="libreoffice-l10n-ve-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602998" comment="libreoffice-l10n-vec-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602999" comment="libreoffice-l10n-vi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603000" comment="libreoffice-l10n-xh-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603001" comment="libreoffice-l10n-zh_CN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603002" comment="libreoffice-l10n-zh_TW-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603003" comment="libreoffice-l10n-zu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603004" comment="libreoffice-mailmerge-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603005" comment="libreoffice-math-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603006" comment="libreoffice-officebean-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603007" comment="libreoffice-pyuno-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603008" comment="libreoffice-qt5-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603009" comment="libreoffice-sdk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603010" comment="libreoffice-sdk-doc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603011" comment="libreoffice-writer-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603012" comment="libreoffice-writer-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603013" comment="libreofficekit-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603014" comment="libreofficekit-devel-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9852</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9852" ref_url="https://www.suse.com/security/cve/CVE-2019-9852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9852/">CVE-2019-9852</cve>
	<bugzilla href="https://bugzilla.suse.com/1146107">SUSE bug 1146107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149944">SUSE bug 1149944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602873" comment="libreoffice-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602874" comment="libreoffice-base-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602875" comment="libreoffice-base-drivers-firebird-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602876" comment="libreoffice-base-drivers-postgresql-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602877" comment="libreoffice-branding-upstream-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602878" comment="libreoffice-calc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602879" comment="libreoffice-calc-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602880" comment="libreoffice-draw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602881" comment="libreoffice-filters-optional-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602882" comment="libreoffice-gdb-pretty-printers-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602883" comment="libreoffice-glade-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602884" comment="libreoffice-gnome-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602885" comment="libreoffice-gtk2-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176159" comment="libreoffice-gtk2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602886" comment="libreoffice-gtk3-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602887" comment="libreoffice-icon-themes-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602888" comment="libreoffice-impress-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602889" comment="libreoffice-l10n-af-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602890" comment="libreoffice-l10n-am-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602891" comment="libreoffice-l10n-ar-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602892" comment="libreoffice-l10n-as-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602893" comment="libreoffice-l10n-ast-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602894" comment="libreoffice-l10n-be-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602895" comment="libreoffice-l10n-bg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602896" comment="libreoffice-l10n-bn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602897" comment="libreoffice-l10n-bn_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602898" comment="libreoffice-l10n-bo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602899" comment="libreoffice-l10n-br-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602900" comment="libreoffice-l10n-brx-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602901" comment="libreoffice-l10n-bs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602902" comment="libreoffice-l10n-ca-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602903" comment="libreoffice-l10n-ca_valencia-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602904" comment="libreoffice-l10n-cs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602905" comment="libreoffice-l10n-cy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602906" comment="libreoffice-l10n-da-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602907" comment="libreoffice-l10n-de-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602908" comment="libreoffice-l10n-dgo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602909" comment="libreoffice-l10n-dsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602910" comment="libreoffice-l10n-dz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602911" comment="libreoffice-l10n-el-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602912" comment="libreoffice-l10n-en-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602913" comment="libreoffice-l10n-en_GB-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602914" comment="libreoffice-l10n-en_ZA-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602915" comment="libreoffice-l10n-eo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602916" comment="libreoffice-l10n-es-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602917" comment="libreoffice-l10n-et-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602918" comment="libreoffice-l10n-eu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602919" comment="libreoffice-l10n-fa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602920" comment="libreoffice-l10n-fi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602921" comment="libreoffice-l10n-fr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602922" comment="libreoffice-l10n-fy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602923" comment="libreoffice-l10n-ga-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602924" comment="libreoffice-l10n-gd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602925" comment="libreoffice-l10n-gl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602926" comment="libreoffice-l10n-gu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602927" comment="libreoffice-l10n-gug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602928" comment="libreoffice-l10n-he-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602929" comment="libreoffice-l10n-hi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602930" comment="libreoffice-l10n-hr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602931" comment="libreoffice-l10n-hsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602932" comment="libreoffice-l10n-hu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602933" comment="libreoffice-l10n-id-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602934" comment="libreoffice-l10n-is-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602935" comment="libreoffice-l10n-it-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602936" comment="libreoffice-l10n-ja-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602937" comment="libreoffice-l10n-ka-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602938" comment="libreoffice-l10n-kab-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602939" comment="libreoffice-l10n-kk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602940" comment="libreoffice-l10n-km-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602941" comment="libreoffice-l10n-kmr_Latn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602942" comment="libreoffice-l10n-kn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602943" comment="libreoffice-l10n-ko-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602944" comment="libreoffice-l10n-kok-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602945" comment="libreoffice-l10n-ks-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602946" comment="libreoffice-l10n-lb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602947" comment="libreoffice-l10n-lo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602948" comment="libreoffice-l10n-lt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602949" comment="libreoffice-l10n-lv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602950" comment="libreoffice-l10n-mai-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602951" comment="libreoffice-l10n-mk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602952" comment="libreoffice-l10n-ml-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602953" comment="libreoffice-l10n-mn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602954" comment="libreoffice-l10n-mni-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602955" comment="libreoffice-l10n-mr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602956" comment="libreoffice-l10n-my-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602957" comment="libreoffice-l10n-nb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602958" comment="libreoffice-l10n-ne-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602959" comment="libreoffice-l10n-nl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602960" comment="libreoffice-l10n-nn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602961" comment="libreoffice-l10n-nr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602962" comment="libreoffice-l10n-nso-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602963" comment="libreoffice-l10n-oc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602964" comment="libreoffice-l10n-om-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602965" comment="libreoffice-l10n-or-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602966" comment="libreoffice-l10n-pa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602967" comment="libreoffice-l10n-pl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602968" comment="libreoffice-l10n-pt_BR-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602969" comment="libreoffice-l10n-pt_PT-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602970" comment="libreoffice-l10n-ro-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602971" comment="libreoffice-l10n-ru-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602972" comment="libreoffice-l10n-rw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602973" comment="libreoffice-l10n-sa_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602974" comment="libreoffice-l10n-sat-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602975" comment="libreoffice-l10n-sd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602976" comment="libreoffice-l10n-si-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602977" comment="libreoffice-l10n-sid-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602978" comment="libreoffice-l10n-sk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602979" comment="libreoffice-l10n-sl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602980" comment="libreoffice-l10n-sq-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602981" comment="libreoffice-l10n-sr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602982" comment="libreoffice-l10n-ss-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602983" comment="libreoffice-l10n-st-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602984" comment="libreoffice-l10n-sv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602985" comment="libreoffice-l10n-sw_TZ-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602986" comment="libreoffice-l10n-ta-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602987" comment="libreoffice-l10n-te-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602988" comment="libreoffice-l10n-tg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602989" comment="libreoffice-l10n-th-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602990" comment="libreoffice-l10n-tn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602991" comment="libreoffice-l10n-tr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602992" comment="libreoffice-l10n-ts-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602993" comment="libreoffice-l10n-tt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602994" comment="libreoffice-l10n-ug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602995" comment="libreoffice-l10n-uk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602996" comment="libreoffice-l10n-uz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602997" comment="libreoffice-l10n-ve-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602998" comment="libreoffice-l10n-vec-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602999" comment="libreoffice-l10n-vi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603000" comment="libreoffice-l10n-xh-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603001" comment="libreoffice-l10n-zh_CN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603002" comment="libreoffice-l10n-zh_TW-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603003" comment="libreoffice-l10n-zu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603004" comment="libreoffice-mailmerge-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603005" comment="libreoffice-math-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603006" comment="libreoffice-officebean-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603007" comment="libreoffice-pyuno-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603008" comment="libreoffice-qt5-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603009" comment="libreoffice-sdk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603010" comment="libreoffice-sdk-doc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603011" comment="libreoffice-writer-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603012" comment="libreoffice-writer-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603013" comment="libreofficekit-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603014" comment="libreofficekit-devel-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9853</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9853" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9853" ref_url="https://www.suse.com/security/cve/CVE-2019-9853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00040.html" source="SUSE-SU"/>
    <description>
    LibreOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the urls to the macros within the document were processed and categorized, resulting in the possibility to construct a document where macro execution bypassed the security settings. The documents were correctly detected as containing macros, and prompted the user to their existence within the documents, but macros within the document were subsequently not controlled by the security settings allowing arbitrary macro execution This issue affects: LibreOffice 6.2 series versions prior to 6.2.7; LibreOffice 6.3 series versions prior to 6.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9853/">CVE-2019-9853</cve>
	<bugzilla href="https://bugzilla.suse.com/1152684">SUSE bug 1152684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604028" comment="cmis-client-0.5.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153300" comment="cmis-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604029" comment="libcmis-0_5-5-0.5.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153309" comment="libcmis-0_5-5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604030" comment="libcmis-c-0_5-5-0.5.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153310" comment="libcmis-c-0_5-5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604031" comment="libcmis-c-devel-0.5.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153311" comment="libcmis-c-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604032" comment="libcmis-devel-0.5.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153312" comment="libcmis-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604033" comment="libixion-0_15-0-0.15.0-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275304" comment="libixion-0_15-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604034" comment="libixion-devel-0.15.0-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153322" comment="libixion-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604035" comment="libixion-tools-0.15.0-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153324" comment="libixion-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604036" comment="libmwaw-0_3-3-0.3.15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158753" comment="libmwaw-0_3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604037" comment="libmwaw-devel-0.3.15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158754" comment="libmwaw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604038" comment="libmwaw-devel-doc-0.3.15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158755" comment="libmwaw-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604039" comment="libmwaw-tools-0.3.15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158756" comment="libmwaw-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604040" comment="liborcus-0_15-0-0.15.3-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275305" comment="liborcus-0_15-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604041" comment="liborcus-devel-0.15.3-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153327" comment="liborcus-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604042" comment="liborcus-tools-0.15.3-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153329" comment="liborcus-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604043" comment="libreoffice-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604044" comment="libreoffice-base-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604045" comment="libreoffice-base-drivers-firebird-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604046" comment="libreoffice-base-drivers-postgresql-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604047" comment="libreoffice-branding-upstream-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604048" comment="libreoffice-calc-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604049" comment="libreoffice-calc-extensions-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604050" comment="libreoffice-draw-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604051" comment="libreoffice-filters-optional-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604052" comment="libreoffice-gdb-pretty-printers-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604053" comment="libreoffice-glade-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604054" comment="libreoffice-gnome-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604055" comment="libreoffice-gtk3-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604056" comment="libreoffice-icon-themes-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604057" comment="libreoffice-impress-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604058" comment="libreoffice-l10n-af-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604059" comment="libreoffice-l10n-am-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604060" comment="libreoffice-l10n-ar-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604061" comment="libreoffice-l10n-as-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604062" comment="libreoffice-l10n-ast-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604063" comment="libreoffice-l10n-be-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604064" comment="libreoffice-l10n-bg-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604065" comment="libreoffice-l10n-bn-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604066" comment="libreoffice-l10n-bn_IN-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604067" comment="libreoffice-l10n-bo-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604068" comment="libreoffice-l10n-br-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604069" comment="libreoffice-l10n-brx-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604070" comment="libreoffice-l10n-bs-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604071" comment="libreoffice-l10n-ca-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604072" comment="libreoffice-l10n-ca_valencia-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604073" comment="libreoffice-l10n-cs-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604074" comment="libreoffice-l10n-cy-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604075" comment="libreoffice-l10n-da-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604076" comment="libreoffice-l10n-de-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604077" comment="libreoffice-l10n-dgo-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604078" comment="libreoffice-l10n-dsb-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604079" comment="libreoffice-l10n-dz-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604080" comment="libreoffice-l10n-el-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604081" comment="libreoffice-l10n-en-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604082" comment="libreoffice-l10n-en_GB-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604083" comment="libreoffice-l10n-en_ZA-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604084" comment="libreoffice-l10n-eo-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604085" comment="libreoffice-l10n-es-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604086" comment="libreoffice-l10n-et-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604087" comment="libreoffice-l10n-eu-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604088" comment="libreoffice-l10n-fa-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604089" comment="libreoffice-l10n-fi-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604090" comment="libreoffice-l10n-fr-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604091" comment="libreoffice-l10n-fy-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604092" comment="libreoffice-l10n-ga-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604093" comment="libreoffice-l10n-gd-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604094" comment="libreoffice-l10n-gl-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604095" comment="libreoffice-l10n-gu-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604096" comment="libreoffice-l10n-gug-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604097" comment="libreoffice-l10n-he-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604098" comment="libreoffice-l10n-hi-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604099" comment="libreoffice-l10n-hr-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604100" comment="libreoffice-l10n-hsb-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604101" comment="libreoffice-l10n-hu-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604102" comment="libreoffice-l10n-id-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604103" comment="libreoffice-l10n-is-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604104" comment="libreoffice-l10n-it-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604105" comment="libreoffice-l10n-ja-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604106" comment="libreoffice-l10n-ka-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604107" comment="libreoffice-l10n-kab-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604108" comment="libreoffice-l10n-kk-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604109" comment="libreoffice-l10n-km-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604110" comment="libreoffice-l10n-kmr_Latn-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604111" comment="libreoffice-l10n-kn-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604112" comment="libreoffice-l10n-ko-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604113" comment="libreoffice-l10n-kok-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604114" comment="libreoffice-l10n-ks-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604115" comment="libreoffice-l10n-lb-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604116" comment="libreoffice-l10n-lo-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604117" comment="libreoffice-l10n-lt-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604118" comment="libreoffice-l10n-lv-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604119" comment="libreoffice-l10n-mai-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604120" comment="libreoffice-l10n-mk-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604121" comment="libreoffice-l10n-ml-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604122" comment="libreoffice-l10n-mn-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604123" comment="libreoffice-l10n-mni-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604124" comment="libreoffice-l10n-mr-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604125" comment="libreoffice-l10n-my-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604126" comment="libreoffice-l10n-nb-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604127" comment="libreoffice-l10n-ne-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604128" comment="libreoffice-l10n-nl-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604129" comment="libreoffice-l10n-nn-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604130" comment="libreoffice-l10n-nr-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604131" comment="libreoffice-l10n-nso-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604132" comment="libreoffice-l10n-oc-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604133" comment="libreoffice-l10n-om-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604134" comment="libreoffice-l10n-or-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604135" comment="libreoffice-l10n-pa-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604136" comment="libreoffice-l10n-pl-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604137" comment="libreoffice-l10n-pt_BR-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604138" comment="libreoffice-l10n-pt_PT-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604139" comment="libreoffice-l10n-ro-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604140" comment="libreoffice-l10n-ru-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604141" comment="libreoffice-l10n-rw-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604142" comment="libreoffice-l10n-sa_IN-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604143" comment="libreoffice-l10n-sat-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604144" comment="libreoffice-l10n-sd-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604145" comment="libreoffice-l10n-si-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604146" comment="libreoffice-l10n-sid-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604147" comment="libreoffice-l10n-sk-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604148" comment="libreoffice-l10n-sl-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604149" comment="libreoffice-l10n-sq-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604150" comment="libreoffice-l10n-sr-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604151" comment="libreoffice-l10n-ss-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604152" comment="libreoffice-l10n-st-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604153" comment="libreoffice-l10n-sv-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604154" comment="libreoffice-l10n-sw_TZ-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604155" comment="libreoffice-l10n-szl-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275306" comment="libreoffice-l10n-szl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604156" comment="libreoffice-l10n-ta-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604157" comment="libreoffice-l10n-te-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604158" comment="libreoffice-l10n-tg-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604159" comment="libreoffice-l10n-th-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604160" comment="libreoffice-l10n-tn-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604161" comment="libreoffice-l10n-tr-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604162" comment="libreoffice-l10n-ts-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604163" comment="libreoffice-l10n-tt-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604164" comment="libreoffice-l10n-ug-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604165" comment="libreoffice-l10n-uk-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604166" comment="libreoffice-l10n-uz-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604167" comment="libreoffice-l10n-ve-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604168" comment="libreoffice-l10n-vec-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604169" comment="libreoffice-l10n-vi-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604170" comment="libreoffice-l10n-xh-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604171" comment="libreoffice-l10n-zh_CN-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604172" comment="libreoffice-l10n-zh_TW-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604173" comment="libreoffice-l10n-zu-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604174" comment="libreoffice-librelogo-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275307" comment="libreoffice-librelogo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604175" comment="libreoffice-mailmerge-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604176" comment="libreoffice-math-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604177" comment="libreoffice-officebean-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604178" comment="libreoffice-pyuno-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604179" comment="libreoffice-qt5-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604180" comment="libreoffice-sdk-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604181" comment="libreoffice-sdk-doc-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604182" comment="libreoffice-writer-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604183" comment="libreoffice-writer-extensions-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604184" comment="libreofficekit-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604185" comment="libreofficekit-devel-6.3.3.2-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604186" comment="mdds-1_5-devel-1.5.0-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275309" comment="mdds-1_5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604187" comment="myspell-af_NA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153406" comment="myspell-af_NA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604188" comment="myspell-af_ZA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153407" comment="myspell-af_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604189" comment="myspell-an-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153408" comment="myspell-an is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604190" comment="myspell-an_ES-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153409" comment="myspell-an_ES is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604191" comment="myspell-ar-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153410" comment="myspell-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604192" comment="myspell-ar_AE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153411" comment="myspell-ar_AE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604193" comment="myspell-ar_BH-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153412" comment="myspell-ar_BH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604194" comment="myspell-ar_DZ-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153413" comment="myspell-ar_DZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604195" comment="myspell-ar_EG-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153414" comment="myspell-ar_EG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604196" comment="myspell-ar_IQ-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153415" comment="myspell-ar_IQ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604197" comment="myspell-ar_JO-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153416" comment="myspell-ar_JO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604198" comment="myspell-ar_KW-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153417" comment="myspell-ar_KW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604199" comment="myspell-ar_LB-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153418" comment="myspell-ar_LB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604200" comment="myspell-ar_LY-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153419" comment="myspell-ar_LY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604201" comment="myspell-ar_MA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153420" comment="myspell-ar_MA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604202" comment="myspell-ar_OM-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153421" comment="myspell-ar_OM is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604203" comment="myspell-ar_QA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153422" comment="myspell-ar_QA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604204" comment="myspell-ar_SA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153423" comment="myspell-ar_SA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604205" comment="myspell-ar_SD-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153424" comment="myspell-ar_SD is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604206" comment="myspell-ar_SY-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153425" comment="myspell-ar_SY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604207" comment="myspell-ar_TN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153426" comment="myspell-ar_TN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604208" comment="myspell-ar_YE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153427" comment="myspell-ar_YE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604209" comment="myspell-be_BY-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153428" comment="myspell-be_BY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604210" comment="myspell-bg_BG-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153429" comment="myspell-bg_BG is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604211" comment="myspell-bn_BD-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153430" comment="myspell-bn_BD is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604212" comment="myspell-bn_IN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153431" comment="myspell-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604213" comment="myspell-bo-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158772" comment="myspell-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604214" comment="myspell-bo_CN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158773" comment="myspell-bo_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604215" comment="myspell-bo_IN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158774" comment="myspell-bo_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604216" comment="myspell-br_FR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153432" comment="myspell-br_FR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604217" comment="myspell-bs-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153433" comment="myspell-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604218" comment="myspell-bs_BA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153434" comment="myspell-bs_BA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604219" comment="myspell-ca-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153435" comment="myspell-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604220" comment="myspell-ca_AD-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153436" comment="myspell-ca_AD is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604221" comment="myspell-ca_ES-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153437" comment="myspell-ca_ES is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604222" comment="myspell-ca_ES_valencia-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153438" comment="myspell-ca_ES_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604223" comment="myspell-ca_FR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153439" comment="myspell-ca_FR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604224" comment="myspell-ca_IT-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153440" comment="myspell-ca_IT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604225" comment="myspell-cs_CZ-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153441" comment="myspell-cs_CZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604226" comment="myspell-da_DK-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153442" comment="myspell-da_DK is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604227" comment="myspell-de-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153443" comment="myspell-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604228" comment="myspell-de_AT-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153444" comment="myspell-de_AT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604229" comment="myspell-de_CH-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153445" comment="myspell-de_CH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604230" comment="myspell-de_DE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153446" comment="myspell-de_DE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604231" comment="myspell-dictionaries-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153447" comment="myspell-dictionaries is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604232" comment="myspell-el_GR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153448" comment="myspell-el_GR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604233" comment="myspell-en-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153449" comment="myspell-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604234" comment="myspell-en_AU-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153450" comment="myspell-en_AU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604235" comment="myspell-en_BS-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153451" comment="myspell-en_BS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604236" comment="myspell-en_BZ-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153452" comment="myspell-en_BZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604237" comment="myspell-en_CA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153453" comment="myspell-en_CA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604238" comment="myspell-en_GB-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153454" comment="myspell-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604239" comment="myspell-en_GH-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153455" comment="myspell-en_GH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604240" comment="myspell-en_IE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153456" comment="myspell-en_IE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604241" comment="myspell-en_IN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153457" comment="myspell-en_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604242" comment="myspell-en_JM-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153458" comment="myspell-en_JM is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604243" comment="myspell-en_MW-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153459" comment="myspell-en_MW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604244" comment="myspell-en_NA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153460" comment="myspell-en_NA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604245" comment="myspell-en_NZ-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153461" comment="myspell-en_NZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604246" comment="myspell-en_PH-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153462" comment="myspell-en_PH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604247" comment="myspell-en_TT-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153463" comment="myspell-en_TT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604248" comment="myspell-en_US-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153464" comment="myspell-en_US is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604249" comment="myspell-en_ZA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153465" comment="myspell-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604250" comment="myspell-en_ZW-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153466" comment="myspell-en_ZW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604251" comment="myspell-es-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153467" comment="myspell-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604252" comment="myspell-es_AR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153468" comment="myspell-es_AR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604253" comment="myspell-es_BO-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153469" comment="myspell-es_BO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604254" comment="myspell-es_CL-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153470" comment="myspell-es_CL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604255" comment="myspell-es_CO-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153471" comment="myspell-es_CO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604256" comment="myspell-es_CR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153472" comment="myspell-es_CR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604257" comment="myspell-es_CU-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153473" comment="myspell-es_CU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604258" comment="myspell-es_DO-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153474" comment="myspell-es_DO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604259" comment="myspell-es_EC-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153475" comment="myspell-es_EC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604260" comment="myspell-es_ES-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153476" comment="myspell-es_ES is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604261" comment="myspell-es_GT-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153477" comment="myspell-es_GT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604262" comment="myspell-es_HN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153478" comment="myspell-es_HN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604263" comment="myspell-es_MX-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153479" comment="myspell-es_MX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604264" comment="myspell-es_NI-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153480" comment="myspell-es_NI is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604265" comment="myspell-es_PA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153481" comment="myspell-es_PA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604266" comment="myspell-es_PE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153482" comment="myspell-es_PE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604267" comment="myspell-es_PR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153483" comment="myspell-es_PR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604268" comment="myspell-es_PY-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153484" comment="myspell-es_PY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604269" comment="myspell-es_SV-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153485" comment="myspell-es_SV is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604270" comment="myspell-es_UY-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153486" comment="myspell-es_UY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604271" comment="myspell-es_VE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153487" comment="myspell-es_VE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604272" comment="myspell-et_EE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153488" comment="myspell-et_EE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604273" comment="myspell-fr_BE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153489" comment="myspell-fr_BE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604274" comment="myspell-fr_CA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153490" comment="myspell-fr_CA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604275" comment="myspell-fr_CH-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153491" comment="myspell-fr_CH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604276" comment="myspell-fr_FR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153492" comment="myspell-fr_FR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604277" comment="myspell-fr_LU-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153493" comment="myspell-fr_LU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604278" comment="myspell-fr_MC-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153494" comment="myspell-fr_MC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604279" comment="myspell-gd_GB-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153495" comment="myspell-gd_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604280" comment="myspell-gl-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153496" comment="myspell-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604281" comment="myspell-gl_ES-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153497" comment="myspell-gl_ES is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604282" comment="myspell-gu_IN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153498" comment="myspell-gu_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604283" comment="myspell-gug-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153499" comment="myspell-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604284" comment="myspell-gug_PY-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153500" comment="myspell-gug_PY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604285" comment="myspell-he_IL-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153501" comment="myspell-he_IL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604286" comment="myspell-hi_IN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153502" comment="myspell-hi_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604287" comment="myspell-hr_HR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153503" comment="myspell-hr_HR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604288" comment="myspell-hu_HU-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153504" comment="myspell-hu_HU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604289" comment="myspell-id-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239767" comment="myspell-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604290" comment="myspell-id_ID-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239768" comment="myspell-id_ID is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604291" comment="myspell-is-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153505" comment="myspell-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604292" comment="myspell-is_IS-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153506" comment="myspell-is_IS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604293" comment="myspell-it_IT-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153507" comment="myspell-it_IT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604294" comment="myspell-kmr_Latn-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153508" comment="myspell-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604295" comment="myspell-kmr_Latn_SY-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153509" comment="myspell-kmr_Latn_SY is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604296" comment="myspell-kmr_Latn_TR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153510" comment="myspell-kmr_Latn_TR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604297" comment="myspell-lightproof-en-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153511" comment="myspell-lightproof-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604298" comment="myspell-lightproof-hu_HU-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153512" comment="myspell-lightproof-hu_HU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604299" comment="myspell-lightproof-pt_BR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153513" comment="myspell-lightproof-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604300" comment="myspell-lightproof-ru_RU-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153514" comment="myspell-lightproof-ru_RU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604301" comment="myspell-lo_LA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153515" comment="myspell-lo_LA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604302" comment="myspell-lt_LT-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153516" comment="myspell-lt_LT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604303" comment="myspell-lv_LV-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153517" comment="myspell-lv_LV is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604304" comment="myspell-nb_NO-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153518" comment="myspell-nb_NO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604305" comment="myspell-ne_NP-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153519" comment="myspell-ne_NP is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604306" comment="myspell-nl_BE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153520" comment="myspell-nl_BE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604307" comment="myspell-nl_NL-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153521" comment="myspell-nl_NL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604308" comment="myspell-nn_NO-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153522" comment="myspell-nn_NO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604309" comment="myspell-no-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153523" comment="myspell-no is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604310" comment="myspell-oc_FR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153524" comment="myspell-oc_FR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604311" comment="myspell-pl_PL-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153525" comment="myspell-pl_PL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604312" comment="myspell-pt_AO-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153526" comment="myspell-pt_AO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604313" comment="myspell-pt_BR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153527" comment="myspell-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604314" comment="myspell-pt_PT-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153528" comment="myspell-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604315" comment="myspell-ro-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153529" comment="myspell-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604316" comment="myspell-ro_RO-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153530" comment="myspell-ro_RO is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604317" comment="myspell-ru_RU-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153531" comment="myspell-ru_RU is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604318" comment="myspell-si_LK-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153532" comment="myspell-si_LK is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604319" comment="myspell-sk_SK-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153533" comment="myspell-sk_SK is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604320" comment="myspell-sl_SI-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153534" comment="myspell-sl_SI is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604321" comment="myspell-sq_AL-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239769" comment="myspell-sq_AL is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604322" comment="myspell-sr-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153535" comment="myspell-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604323" comment="myspell-sr_CS-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153536" comment="myspell-sr_CS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604324" comment="myspell-sr_Latn_CS-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153537" comment="myspell-sr_Latn_CS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604325" comment="myspell-sr_Latn_RS-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153538" comment="myspell-sr_Latn_RS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604326" comment="myspell-sr_RS-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153539" comment="myspell-sr_RS is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604327" comment="myspell-sv_FI-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153540" comment="myspell-sv_FI is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604328" comment="myspell-sv_SE-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153541" comment="myspell-sv_SE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604329" comment="myspell-sw_TZ-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153542" comment="myspell-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604330" comment="myspell-te-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153543" comment="myspell-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604331" comment="myspell-te_IN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153544" comment="myspell-te_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604332" comment="myspell-th_TH-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153545" comment="myspell-th_TH is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604333" comment="myspell-tr-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239770" comment="myspell-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604334" comment="myspell-tr_TR-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239771" comment="myspell-tr_TR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604335" comment="myspell-uk_UA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153546" comment="myspell-uk_UA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604336" comment="myspell-vi-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153547" comment="myspell-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604337" comment="myspell-vi_VN-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153548" comment="myspell-vi_VN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604338" comment="myspell-zu_ZA-20191016-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153549" comment="myspell-zu_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604339" comment="python3-libixion-0.15.0-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262471" comment="python3-libixion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604340" comment="python3-liborcus-0.15.3-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262473" comment="python3-liborcus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604341" comment="spdlog-devel-0.16.3-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275311" comment="spdlog-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9854</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9854" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9854" ref_url="https://www.suse.com/security/cve/CVE-2019-9854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2019-9852, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed by employing a URL encoding attack to defeat the path verification step. However this protection could be bypassed by taking advantage of a flaw in how LibreOffice assembled the final script URL location directly from components of the passed in path as opposed to solely from the sanitized output of the path verification step. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9854/">CVE-2019-9854</cve>
	<bugzilla href="https://bugzilla.suse.com/1149944">SUSE bug 1149944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602873" comment="libreoffice-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602874" comment="libreoffice-base-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602875" comment="libreoffice-base-drivers-firebird-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602876" comment="libreoffice-base-drivers-postgresql-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602877" comment="libreoffice-branding-upstream-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602878" comment="libreoffice-calc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602879" comment="libreoffice-calc-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602880" comment="libreoffice-draw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602881" comment="libreoffice-filters-optional-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602882" comment="libreoffice-gdb-pretty-printers-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602883" comment="libreoffice-glade-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602884" comment="libreoffice-gnome-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602885" comment="libreoffice-gtk2-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176159" comment="libreoffice-gtk2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602886" comment="libreoffice-gtk3-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602887" comment="libreoffice-icon-themes-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602888" comment="libreoffice-impress-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602889" comment="libreoffice-l10n-af-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602890" comment="libreoffice-l10n-am-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602891" comment="libreoffice-l10n-ar-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602892" comment="libreoffice-l10n-as-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602893" comment="libreoffice-l10n-ast-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602894" comment="libreoffice-l10n-be-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602895" comment="libreoffice-l10n-bg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602896" comment="libreoffice-l10n-bn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602897" comment="libreoffice-l10n-bn_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602898" comment="libreoffice-l10n-bo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602899" comment="libreoffice-l10n-br-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602900" comment="libreoffice-l10n-brx-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602901" comment="libreoffice-l10n-bs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602902" comment="libreoffice-l10n-ca-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602903" comment="libreoffice-l10n-ca_valencia-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602904" comment="libreoffice-l10n-cs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602905" comment="libreoffice-l10n-cy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602906" comment="libreoffice-l10n-da-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602907" comment="libreoffice-l10n-de-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602908" comment="libreoffice-l10n-dgo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602909" comment="libreoffice-l10n-dsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602910" comment="libreoffice-l10n-dz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602911" comment="libreoffice-l10n-el-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602912" comment="libreoffice-l10n-en-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602913" comment="libreoffice-l10n-en_GB-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602914" comment="libreoffice-l10n-en_ZA-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602915" comment="libreoffice-l10n-eo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602916" comment="libreoffice-l10n-es-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602917" comment="libreoffice-l10n-et-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602918" comment="libreoffice-l10n-eu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602919" comment="libreoffice-l10n-fa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602920" comment="libreoffice-l10n-fi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602921" comment="libreoffice-l10n-fr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602922" comment="libreoffice-l10n-fy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602923" comment="libreoffice-l10n-ga-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602924" comment="libreoffice-l10n-gd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602925" comment="libreoffice-l10n-gl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602926" comment="libreoffice-l10n-gu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602927" comment="libreoffice-l10n-gug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602928" comment="libreoffice-l10n-he-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602929" comment="libreoffice-l10n-hi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602930" comment="libreoffice-l10n-hr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602931" comment="libreoffice-l10n-hsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602932" comment="libreoffice-l10n-hu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602933" comment="libreoffice-l10n-id-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602934" comment="libreoffice-l10n-is-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602935" comment="libreoffice-l10n-it-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602936" comment="libreoffice-l10n-ja-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602937" comment="libreoffice-l10n-ka-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602938" comment="libreoffice-l10n-kab-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602939" comment="libreoffice-l10n-kk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602940" comment="libreoffice-l10n-km-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602941" comment="libreoffice-l10n-kmr_Latn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602942" comment="libreoffice-l10n-kn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602943" comment="libreoffice-l10n-ko-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602944" comment="libreoffice-l10n-kok-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602945" comment="libreoffice-l10n-ks-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602946" comment="libreoffice-l10n-lb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602947" comment="libreoffice-l10n-lo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602948" comment="libreoffice-l10n-lt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602949" comment="libreoffice-l10n-lv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602950" comment="libreoffice-l10n-mai-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602951" comment="libreoffice-l10n-mk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602952" comment="libreoffice-l10n-ml-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602953" comment="libreoffice-l10n-mn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602954" comment="libreoffice-l10n-mni-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602955" comment="libreoffice-l10n-mr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602956" comment="libreoffice-l10n-my-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602957" comment="libreoffice-l10n-nb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602958" comment="libreoffice-l10n-ne-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602959" comment="libreoffice-l10n-nl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602960" comment="libreoffice-l10n-nn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602961" comment="libreoffice-l10n-nr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602962" comment="libreoffice-l10n-nso-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602963" comment="libreoffice-l10n-oc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602964" comment="libreoffice-l10n-om-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602965" comment="libreoffice-l10n-or-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602966" comment="libreoffice-l10n-pa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602967" comment="libreoffice-l10n-pl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602968" comment="libreoffice-l10n-pt_BR-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602969" comment="libreoffice-l10n-pt_PT-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602970" comment="libreoffice-l10n-ro-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602971" comment="libreoffice-l10n-ru-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602972" comment="libreoffice-l10n-rw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602973" comment="libreoffice-l10n-sa_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602974" comment="libreoffice-l10n-sat-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602975" comment="libreoffice-l10n-sd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602976" comment="libreoffice-l10n-si-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602977" comment="libreoffice-l10n-sid-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602978" comment="libreoffice-l10n-sk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602979" comment="libreoffice-l10n-sl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602980" comment="libreoffice-l10n-sq-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602981" comment="libreoffice-l10n-sr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602982" comment="libreoffice-l10n-ss-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602983" comment="libreoffice-l10n-st-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602984" comment="libreoffice-l10n-sv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602985" comment="libreoffice-l10n-sw_TZ-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602986" comment="libreoffice-l10n-ta-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602987" comment="libreoffice-l10n-te-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602988" comment="libreoffice-l10n-tg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602989" comment="libreoffice-l10n-th-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602990" comment="libreoffice-l10n-tn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602991" comment="libreoffice-l10n-tr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602992" comment="libreoffice-l10n-ts-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602993" comment="libreoffice-l10n-tt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602994" comment="libreoffice-l10n-ug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602995" comment="libreoffice-l10n-uk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602996" comment="libreoffice-l10n-uz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602997" comment="libreoffice-l10n-ve-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602998" comment="libreoffice-l10n-vec-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602999" comment="libreoffice-l10n-vi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603000" comment="libreoffice-l10n-xh-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603001" comment="libreoffice-l10n-zh_CN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603002" comment="libreoffice-l10n-zh_TW-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603003" comment="libreoffice-l10n-zu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603004" comment="libreoffice-mailmerge-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603005" comment="libreoffice-math-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603006" comment="libreoffice-officebean-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603007" comment="libreoffice-pyuno-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603008" comment="libreoffice-qt5-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603009" comment="libreoffice-sdk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603010" comment="libreoffice-sdk-doc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603011" comment="libreoffice-writer-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603012" comment="libreoffice-writer-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603013" comment="libreofficekit-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603014" comment="libreofficekit-devel-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9855</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9855" ref_url="https://www.suse.com/security/cve/CVE-2019-9855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" source="SUSE-SU"/>
    <description>
    LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9855/">CVE-2019-9855</cve>
	<bugzilla href="https://bugzilla.suse.com/1149943">SUSE bug 1149943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602873" comment="libreoffice-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602874" comment="libreoffice-base-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602875" comment="libreoffice-base-drivers-firebird-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602876" comment="libreoffice-base-drivers-postgresql-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602877" comment="libreoffice-branding-upstream-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602878" comment="libreoffice-calc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602879" comment="libreoffice-calc-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602880" comment="libreoffice-draw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602881" comment="libreoffice-filters-optional-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602882" comment="libreoffice-gdb-pretty-printers-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602883" comment="libreoffice-glade-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602884" comment="libreoffice-gnome-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602885" comment="libreoffice-gtk2-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176159" comment="libreoffice-gtk2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602886" comment="libreoffice-gtk3-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602887" comment="libreoffice-icon-themes-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602888" comment="libreoffice-impress-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602889" comment="libreoffice-l10n-af-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602890" comment="libreoffice-l10n-am-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602891" comment="libreoffice-l10n-ar-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602892" comment="libreoffice-l10n-as-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602893" comment="libreoffice-l10n-ast-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602894" comment="libreoffice-l10n-be-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602895" comment="libreoffice-l10n-bg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602896" comment="libreoffice-l10n-bn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602897" comment="libreoffice-l10n-bn_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602898" comment="libreoffice-l10n-bo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602899" comment="libreoffice-l10n-br-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602900" comment="libreoffice-l10n-brx-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602901" comment="libreoffice-l10n-bs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602902" comment="libreoffice-l10n-ca-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602903" comment="libreoffice-l10n-ca_valencia-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602904" comment="libreoffice-l10n-cs-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602905" comment="libreoffice-l10n-cy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602906" comment="libreoffice-l10n-da-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602907" comment="libreoffice-l10n-de-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602908" comment="libreoffice-l10n-dgo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602909" comment="libreoffice-l10n-dsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602910" comment="libreoffice-l10n-dz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602911" comment="libreoffice-l10n-el-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602912" comment="libreoffice-l10n-en-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602913" comment="libreoffice-l10n-en_GB-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602914" comment="libreoffice-l10n-en_ZA-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602915" comment="libreoffice-l10n-eo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602916" comment="libreoffice-l10n-es-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602917" comment="libreoffice-l10n-et-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602918" comment="libreoffice-l10n-eu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602919" comment="libreoffice-l10n-fa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602920" comment="libreoffice-l10n-fi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602921" comment="libreoffice-l10n-fr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602922" comment="libreoffice-l10n-fy-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602923" comment="libreoffice-l10n-ga-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602924" comment="libreoffice-l10n-gd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602925" comment="libreoffice-l10n-gl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602926" comment="libreoffice-l10n-gu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602927" comment="libreoffice-l10n-gug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602928" comment="libreoffice-l10n-he-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602929" comment="libreoffice-l10n-hi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602930" comment="libreoffice-l10n-hr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602931" comment="libreoffice-l10n-hsb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602932" comment="libreoffice-l10n-hu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602933" comment="libreoffice-l10n-id-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602934" comment="libreoffice-l10n-is-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602935" comment="libreoffice-l10n-it-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602936" comment="libreoffice-l10n-ja-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602937" comment="libreoffice-l10n-ka-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602938" comment="libreoffice-l10n-kab-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602939" comment="libreoffice-l10n-kk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602940" comment="libreoffice-l10n-km-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602941" comment="libreoffice-l10n-kmr_Latn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602942" comment="libreoffice-l10n-kn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602943" comment="libreoffice-l10n-ko-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602944" comment="libreoffice-l10n-kok-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602945" comment="libreoffice-l10n-ks-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602946" comment="libreoffice-l10n-lb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602947" comment="libreoffice-l10n-lo-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602948" comment="libreoffice-l10n-lt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602949" comment="libreoffice-l10n-lv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602950" comment="libreoffice-l10n-mai-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602951" comment="libreoffice-l10n-mk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602952" comment="libreoffice-l10n-ml-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602953" comment="libreoffice-l10n-mn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602954" comment="libreoffice-l10n-mni-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602955" comment="libreoffice-l10n-mr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602956" comment="libreoffice-l10n-my-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602957" comment="libreoffice-l10n-nb-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602958" comment="libreoffice-l10n-ne-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602959" comment="libreoffice-l10n-nl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602960" comment="libreoffice-l10n-nn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602961" comment="libreoffice-l10n-nr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602962" comment="libreoffice-l10n-nso-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602963" comment="libreoffice-l10n-oc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602964" comment="libreoffice-l10n-om-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602965" comment="libreoffice-l10n-or-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602966" comment="libreoffice-l10n-pa-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602967" comment="libreoffice-l10n-pl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602968" comment="libreoffice-l10n-pt_BR-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602969" comment="libreoffice-l10n-pt_PT-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602970" comment="libreoffice-l10n-ro-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602971" comment="libreoffice-l10n-ru-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602972" comment="libreoffice-l10n-rw-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602973" comment="libreoffice-l10n-sa_IN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602974" comment="libreoffice-l10n-sat-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602975" comment="libreoffice-l10n-sd-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602976" comment="libreoffice-l10n-si-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602977" comment="libreoffice-l10n-sid-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602978" comment="libreoffice-l10n-sk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602979" comment="libreoffice-l10n-sl-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602980" comment="libreoffice-l10n-sq-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602981" comment="libreoffice-l10n-sr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602982" comment="libreoffice-l10n-ss-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602983" comment="libreoffice-l10n-st-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602984" comment="libreoffice-l10n-sv-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602985" comment="libreoffice-l10n-sw_TZ-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602986" comment="libreoffice-l10n-ta-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602987" comment="libreoffice-l10n-te-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602988" comment="libreoffice-l10n-tg-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602989" comment="libreoffice-l10n-th-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602990" comment="libreoffice-l10n-tn-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602991" comment="libreoffice-l10n-tr-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602992" comment="libreoffice-l10n-ts-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602993" comment="libreoffice-l10n-tt-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602994" comment="libreoffice-l10n-ug-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602995" comment="libreoffice-l10n-uk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602996" comment="libreoffice-l10n-uz-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602997" comment="libreoffice-l10n-ve-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602998" comment="libreoffice-l10n-vec-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009602999" comment="libreoffice-l10n-vi-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603000" comment="libreoffice-l10n-xh-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603001" comment="libreoffice-l10n-zh_CN-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603002" comment="libreoffice-l10n-zh_TW-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603003" comment="libreoffice-l10n-zu-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603004" comment="libreoffice-mailmerge-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603005" comment="libreoffice-math-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603006" comment="libreoffice-officebean-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603007" comment="libreoffice-pyuno-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603008" comment="libreoffice-qt5-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603009" comment="libreoffice-sdk-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603010" comment="libreoffice-sdk-doc-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603011" comment="libreoffice-writer-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603012" comment="libreoffice-writer-extensions-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603013" comment="libreofficekit-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603014" comment="libreofficekit-devel-6.2.7.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9892</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9892" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9892" ref_url="https://www.suse.com/security/cve/CVE-2019-9892" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Open Ticket Request System (OTRS) 5.x through 5.0.34, 6.x through 6.0.17, and 7.x through 7.0.6. An attacker who is logged into OTRS as an agent user with appropriate permissions may try to import carefully crafted Report Statistics XML that will result in reading of arbitrary files on the OTRS filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9892/">CVE-2019-9892</cve>
	<bugzilla href="https://bugzilla.suse.com/1133755">SUSE bug 1133755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139406">SUSE bug 1139406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9893</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html" source="SUSE-SU"/>
    <description>
    libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603247" comment="libseccomp-devel-2.4.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267594" comment="libseccomp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603248" comment="libseccomp-tools-2.4.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267595" comment="libseccomp-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603249" comment="libseccomp2-2.4.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267596" comment="libseccomp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603250" comment="libseccomp2-32bit-2.4.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267597" comment="libseccomp2-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9917</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9917" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9917" ref_url="https://www.suse.com/security/cve/CVE-2019-9917" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00018.html" source="SUSE-SU"/>
    <description>
    ZNC before 1.7.3-rc1 allows an existing remote user to cause a Denial of Service (crash) via invalid encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9917/">CVE-2019-9917</cve>
	<bugzilla href="https://bugzilla.suse.com/1130360">SUSE bug 1130360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609741" comment="znc-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251916" comment="znc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609742" comment="znc-devel-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251918" comment="znc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609743" comment="znc-lang-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251920" comment="znc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609744" comment="znc-perl-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251922" comment="znc-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609745" comment="znc-python3-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251924" comment="znc-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609746" comment="znc-tcl-1.7.4-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251926" comment="znc-tcl is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9928</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1300-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0678-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-05/msg00129.html" source="SUSE-SU"/>
    <description>
    GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607985" comment="gstreamer-plugins-base-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607986" comment="gstreamer-plugins-base-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153928" comment="gstreamer-plugins-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607987" comment="gstreamer-plugins-base-devel-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153929" comment="gstreamer-plugins-base-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607988" comment="gstreamer-plugins-base-devel-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154283" comment="gstreamer-plugins-base-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607989" comment="gstreamer-plugins-base-doc-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153930" comment="gstreamer-plugins-base-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607990" comment="gstreamer-plugins-base-lang-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153931" comment="gstreamer-plugins-base-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607991" comment="libgstallocators-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607992" comment="libgstallocators-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153933" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607993" comment="libgstapp-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607994" comment="libgstapp-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153937" comment="libgstapp-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607995" comment="libgstaudio-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607996" comment="libgstaudio-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153939" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607997" comment="libgstfft-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153940" comment="libgstfft-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607998" comment="libgstfft-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153941" comment="libgstfft-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607999" comment="libgstpbutils-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608000" comment="libgstpbutils-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153945" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608001" comment="libgstriff-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608002" comment="libgstriff-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153947" comment="libgstriff-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608003" comment="libgstrtp-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153948" comment="libgstrtp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608004" comment="libgstrtp-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153949" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608005" comment="libgstrtsp-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153950" comment="libgstrtsp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608006" comment="libgstrtsp-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153951" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608007" comment="libgstsdp-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153952" comment="libgstsdp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608008" comment="libgstsdp-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153953" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608009" comment="libgsttag-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608010" comment="libgsttag-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153955" comment="libgsttag-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608011" comment="libgstvideo-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608012" comment="libgstvideo-1_0-0-32bit-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153957" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608013" comment="typelib-1_0-GstAllocators-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153958" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608014" comment="typelib-1_0-GstApp-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153960" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608015" comment="typelib-1_0-GstAudio-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153961" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608016" comment="typelib-1_0-GstFft-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153962" comment="typelib-1_0-GstFft-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608017" comment="typelib-1_0-GstPbutils-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153964" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608018" comment="typelib-1_0-GstRtp-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153966" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608019" comment="typelib-1_0-GstRtsp-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153967" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608020" comment="typelib-1_0-GstSdp-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153968" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608021" comment="typelib-1_0-GstTag-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153969" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608022" comment="typelib-1_0-GstVideo-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153970" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9947</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9947" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1352-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136184">SUSE bug 1136184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603367" comment="libpython2_7-1_0-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603368" comment="libpython2_7-1_0-32bit-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609036" comment="libpython3_6m1_0-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609037" comment="libpython3_6m1_0-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603369" comment="python-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603370" comment="python-32bit-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603371" comment="python-base-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603372" comment="python-base-32bit-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603373" comment="python-curses-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603374" comment="python-demo-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603375" comment="python-devel-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603376" comment="python-doc-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603377" comment="python-doc-pdf-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603378" comment="python-gdbm-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603379" comment="python-idle-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603380" comment="python-tk-2.7.14-lp151.10.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009603381" comment="python-xml-2.7.14-lp151.10.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609038" comment="python3-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609039" comment="python3-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609040" comment="python3-base-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609041" comment="python3-base-32bit-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609042" comment="python3-curses-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609043" comment="python3-dbm-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609044" comment="python3-devel-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609045" comment="python3-idle-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609046" comment="python3-testsuite-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609047" comment="python3-tk-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609048" comment="python3-tools-3.6.10-lp151.6.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0034</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0034" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1297-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0680-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-05/msg00126.html" source="SUSE-SU"/>
    <description>
    In vp8_decode_frame of decodeframe.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure if error correction were turned on, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1Android ID: A-62458770
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034</cve>
	<bugzilla href="https://bugzilla.suse.com/1166066">SUSE bug 1166066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608029" comment="libvpx-devel-1.6.1-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170222" comment="libvpx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608030" comment="libvpx4-1.6.1-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177224" comment="libvpx4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608031" comment="libvpx4-32bit-1.6.1-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277006" comment="libvpx4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608032" comment="vpx-tools-1.6.1-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170228" comment="vpx-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0093</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0093" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093</cve>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608454" comment="libexif-devel-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608455" comment="libexif-devel-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279253" comment="libexif-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608456" comment="libexif12-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608457" comment="libexif12-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0305</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0404</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0404" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0427</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0430</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0430" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0430" ref_url="https://www.suse.com/security/cve/CVE-2020-0430" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
    <description>
    In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0430/">CVE-2020-0430</cve>
	<bugzilla href="https://bugzilla.suse.com/1176723">SUSE bug 1176723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178003">SUSE bug 1178003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606106" comment="kernel-debug-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606107" comment="kernel-debug-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606108" comment="kernel-debug-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606109" comment="kernel-default-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606110" comment="kernel-default-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606111" comment="kernel-default-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606112" comment="kernel-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606113" comment="kernel-docs-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606114" comment="kernel-docs-html-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606115" comment="kernel-kvmsmall-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606116" comment="kernel-kvmsmall-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606117" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606118" comment="kernel-macros-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606119" comment="kernel-obs-build-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606120" comment="kernel-obs-qa-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606121" comment="kernel-source-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606122" comment="kernel-source-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606123" comment="kernel-syms-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606124" comment="kernel-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606125" comment="kernel-vanilla-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606126" comment="kernel-vanilla-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0431</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0431" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0432</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0444</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0465</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0466</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0487</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0487" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0487" ref_url="https://www.suse.com/security/cve/CVE-2020-0487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWY2EXAD52MSG6ZRFPI2CF3APYF7OZ7F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3IU5K7DTVB7RH7VVIUTMX4XFQDWSHYUS/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0487/">CVE-2020-0487</cve>
	<bugzilla href="https://bugzilla.suse.com/1180112">SUSE bug 1180112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606908" comment="flac-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152521" comment="flac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606909" comment="flac-devel-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152522" comment="flac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606910" comment="flac-devel-32bit-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175207" comment="flac-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606911" comment="flac-doc-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175208" comment="flac-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606912" comment="libFLAC++6-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152523" comment="libFLAC++6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606913" comment="libFLAC++6-32bit-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175209" comment="libFLAC++6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606914" comment="libFLAC8-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152524" comment="libFLAC8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606915" comment="libFLAC8-32bit-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152525" comment="libFLAC8-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0499</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWY2EXAD52MSG6ZRFPI2CF3APYF7OZ7F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3IU5K7DTVB7RH7VVIUTMX4XFQDWSHYUS/" source="SUSE-SU"/>
    <description>
    In FLAC__bitreader_read_rice_signed_block of bitreader.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156076070
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606908" comment="flac-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152521" comment="flac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606909" comment="flac-devel-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152522" comment="flac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606910" comment="flac-devel-32bit-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175207" comment="flac-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606911" comment="flac-doc-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175208" comment="flac-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606912" comment="libFLAC++6-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152523" comment="libFLAC++6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606913" comment="libFLAC++6-32bit-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009175209" comment="libFLAC++6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606914" comment="libFLAC8-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152524" comment="libFLAC8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606915" comment="libFLAC8-32bit-1.3.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152525" comment="libFLAC8-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008731.html" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID000019643" ref_url="https://www.suse.com/support/kb/doc/?id=000019643" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0818-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172206">SUSE bug 1172206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172207">SUSE bug 1172207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172770">SUSE bug 1172770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608453" comment="ucode-intel-20200602-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609233" comment="xen-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609234" comment="xen-devel-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609235" comment="xen-doc-html-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609236" comment="xen-libs-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609237" comment="xen-libs-32bit-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609238" comment="xen-tools-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609239" comment="xen-tools-domU-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0548</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="TID000019635" ref_url="https://www.suse.com/support/kb/doc/?id=000019635" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608453" comment="ucode-intel-20200602-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0549</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="TID000019635" ref_url="https://www.suse.com/support/kb/doc/?id=000019635" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608453" comment="ucode-intel-20200602-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00055.html" source="SUSE-SU"/>
    <description>
    Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607412" comment="bluez-5.48-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165944" comment="bluez is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607413" comment="bluez-auto-enable-devices-5.48-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242424" comment="bluez-auto-enable-devices is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607414" comment="bluez-cups-5.48-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165946" comment="bluez-cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607415" comment="bluez-devel-5.48-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165948" comment="bluez-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607416" comment="bluez-devel-32bit-5.48-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165950" comment="bluez-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607417" comment="bluez-test-5.48-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165952" comment="bluez-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607418" comment="libbluetooth3-5.48-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607419" comment="libbluetooth3-32bit-5.48-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165956" comment="libbluetooth3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0561</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0561" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0561" ref_url="https://www.suse.com/security/cve/CVE-2020-0561" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00014.html" source="SUSE-SU"/>
    <description>
    Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-0561/">CVE-2020-0561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609823" comment="chromedriver-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609824" comment="chromium-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0569</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006459.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00012.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162191">SUSE bug 1162191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606422" comment="libQt5Bootstrap-devel-static-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606423" comment="libQt5Bootstrap-devel-static-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152269" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606424" comment="libQt5Concurrent-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606425" comment="libQt5Concurrent-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152275" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606426" comment="libQt5Concurrent5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606427" comment="libQt5Concurrent5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152277" comment="libQt5Concurrent5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606428" comment="libQt5Core-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606429" comment="libQt5Core-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152279" comment="libQt5Core-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606430" comment="libQt5Core-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606431" comment="libQt5Core5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606432" comment="libQt5Core5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152282" comment="libQt5Core5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606433" comment="libQt5DBus-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606434" comment="libQt5DBus-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152284" comment="libQt5DBus-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606435" comment="libQt5DBus-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606436" comment="libQt5DBus5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606437" comment="libQt5DBus5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152287" comment="libQt5DBus5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606438" comment="libQt5Gui-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606439" comment="libQt5Gui-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152295" comment="libQt5Gui-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606440" comment="libQt5Gui-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606441" comment="libQt5Gui5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606442" comment="libQt5Gui5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152298" comment="libQt5Gui5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606443" comment="libQt5KmsSupport-devel-static-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245302" comment="libQt5KmsSupport-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606444" comment="libQt5KmsSupport-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245303" comment="libQt5KmsSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606445" comment="libQt5Network-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606446" comment="libQt5Network-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152306" comment="libQt5Network-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606447" comment="libQt5Network-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606448" comment="libQt5Network5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606449" comment="libQt5Network5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152309" comment="libQt5Network5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606450" comment="libQt5OpenGL-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606451" comment="libQt5OpenGL-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152314" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606452" comment="libQt5OpenGL-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606453" comment="libQt5OpenGL5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606454" comment="libQt5OpenGL5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152317" comment="libQt5OpenGL5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606455" comment="libQt5OpenGLExtensions-devel-static-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606456" comment="libQt5OpenGLExtensions-devel-static-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152319" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606457" comment="libQt5PlatformHeaders-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606458" comment="libQt5PlatformSupport-devel-static-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606459" comment="libQt5PlatformSupport-devel-static-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152322" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606460" comment="libQt5PlatformSupport-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606461" comment="libQt5PrintSupport-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606462" comment="libQt5PrintSupport-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152327" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606463" comment="libQt5PrintSupport-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606464" comment="libQt5PrintSupport5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606465" comment="libQt5PrintSupport5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152330" comment="libQt5PrintSupport5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606466" comment="libQt5Sql-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606467" comment="libQt5Sql-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152339" comment="libQt5Sql-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606468" comment="libQt5Sql-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606469" comment="libQt5Sql5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606470" comment="libQt5Sql5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152342" comment="libQt5Sql5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606471" comment="libQt5Sql5-mysql-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606472" comment="libQt5Sql5-mysql-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152344" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606473" comment="libQt5Sql5-postgresql-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606474" comment="libQt5Sql5-postgresql-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152346" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606475" comment="libQt5Sql5-sqlite-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606476" comment="libQt5Sql5-sqlite-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152348" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606477" comment="libQt5Sql5-unixODBC-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606478" comment="libQt5Sql5-unixODBC-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152350" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606479" comment="libQt5Test-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606480" comment="libQt5Test-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152354" comment="libQt5Test-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606481" comment="libQt5Test-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606482" comment="libQt5Test5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606483" comment="libQt5Test5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152357" comment="libQt5Test5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606484" comment="libQt5Widgets-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606485" comment="libQt5Widgets-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152378" comment="libQt5Widgets-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606486" comment="libQt5Widgets-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606487" comment="libQt5Widgets5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606488" comment="libQt5Widgets5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152381" comment="libQt5Widgets5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606489" comment="libQt5Xml-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606490" comment="libQt5Xml-devel-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152385" comment="libQt5Xml-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606491" comment="libQt5Xml5-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606492" comment="libQt5Xml5-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152387" comment="libQt5Xml5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606493" comment="libqt5-qtbase-common-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606494" comment="libqt5-qtbase-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606495" comment="libqt5-qtbase-examples-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606496" comment="libqt5-qtbase-examples-32bit-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152405" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606497" comment="libqt5-qtbase-platformtheme-gtk3-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177209" comment="libqt5-qtbase-platformtheme-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606498" comment="libqt5-qtbase-private-headers-devel-5.9.7-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10018</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00008.html" source="SUSE-SU"/>
    <description>
    WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0) contains a memory corruption issue (use-after-free) that may lead to arbitrary code execution. This issue has been fixed in 2.28.0 with improved memory handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-26"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607811" comment="libjavascriptcoregtk-4_0-18-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607812" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607813" comment="libwebkit2gtk-4_0-37-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607814" comment="libwebkit2gtk-4_0-37-32bit-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607815" comment="libwebkit2gtk3-lang-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607816" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607817" comment="typelib-1_0-WebKit2-4_0-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607818" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607819" comment="webkit-jsc-4-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607820" comment="webkit2gtk-4_0-injected-bundles-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607821" comment="webkit2gtk3-devel-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607822" comment="webkit2gtk3-minibrowser-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10029</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html" source="SUSE-SU"/>
    <description>
    The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029</cve>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607252" comment="glibc-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607253" comment="glibc-32bit-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607254" comment="glibc-devel-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607255" comment="glibc-devel-32bit-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607256" comment="glibc-devel-static-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607257" comment="glibc-devel-static-32bit-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607258" comment="glibc-extra-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607259" comment="glibc-html-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607260" comment="glibc-i18ndata-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607261" comment="glibc-info-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607262" comment="glibc-locale-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607263" comment="glibc-locale-base-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607264" comment="glibc-locale-base-32bit-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607265" comment="glibc-profile-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607266" comment="glibc-profile-32bit-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607267" comment="glibc-utils-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607268" comment="glibc-utils-32bit-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607269" comment="nscd-2.26-lp151.19.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10030</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10030" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10030" ref_url="https://www.suse.com/security/cve/CVE-2020-10030" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" source="SUSE-SU"/>
    <description>
    An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have '\0' termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has '\0' termination.) Under some conditions, this issue can lead to the writing of one '\0' byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10030/">CVE-2020-10030</cve>
	<bugzilla href="https://bugzilla.suse.com/1171553">SUSE bug 1171553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609825" comment="pdns-recursor-4.1.12-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153799" comment="pdns-recursor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10135</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10531</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175778">SUSE bug 1175778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607350" comment="icu-60.2-lp151.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163213" comment="icu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607351" comment="libicu-devel-60.2-lp151.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152556" comment="libicu-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607352" comment="libicu-devel-32bit-60.2-lp151.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163218" comment="libicu-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607353" comment="libicu-doc-60.2-lp151.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163220" comment="libicu-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607354" comment="libicu60_2-60.2-lp151.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281166" comment="libicu60_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607355" comment="libicu60_2-32bit-60.2-lp151.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281167" comment="libicu60_2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607356" comment="libicu60_2-bedata-60.2-lp151.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281168" comment="libicu60_2-bedata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607357" comment="libicu60_2-ledata-60.2-lp151.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281169" comment="libicu60_2-ledata is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" source="SUSE-SU"/>
    <description>
    Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609004" comment="perl-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609005" comment="perl-32bit-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609006" comment="perl-base-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609007" comment="perl-base-32bit-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153231" comment="perl-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609008" comment="perl-doc-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10592</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10592" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10592" ref_url="https://www.suse.com/security/cve/CVE-2020-10592" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LICIVWVPYBVUILMW5J4DEG6B67OGC45P/" source="SUSE-SU"/>
    <description>
    Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10592/">CVE-2020-10592</cve>
	<bugzilla href="https://bugzilla.suse.com/1167013">SUSE bug 1167013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609826" comment="tor-0.3.5.12-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10593</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10593" ref_url="https://www.suse.com/security/cve/CVE-2020-10593" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LICIVWVPYBVUILMW5J4DEG6B67OGC45P/" source="SUSE-SU"/>
    <description>
    Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10593/">CVE-2020-10593</cve>
	<bugzilla href="https://bugzilla.suse.com/1167014">SUSE bug 1167014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609826" comment="tor-0.3.5.12-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10648</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10648" ref_url="https://www.suse.com/security/cve/CVE-2020-10648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10648/">CVE-2020-10648</cve>
	<bugzilla href="https://bugzilla.suse.com/1167209">SUSE bug 1167209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10663</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html" source="SUSE-SU"/>
    <description>
    The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663</cve>
	<bugzilla href="https://bugzilla.suse.com/1167244">SUSE bug 1167244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607673" comment="libruby2_5-2_5-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607674" comment="ruby2.5-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607675" comment="ruby2.5-devel-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607676" comment="ruby2.5-devel-extra-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607677" comment="ruby2.5-doc-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607678" comment="ruby2.5-doc-ri-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607679" comment="ruby2.5-stdlib-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10683</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10683" ref_url="https://www.suse.com/security/cve/CVE-2020-10683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006848.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html" source="SUSE-SU"/>
    <description>
    dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10683/">CVE-2020-10683</cve>
	<bugzilla href="https://bugzilla.suse.com/1169760">SUSE bug 1169760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608170" comment="dom4j-1.6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235633" comment="dom4j is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608171" comment="dom4j-demo-1.6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235634" comment="dom4j-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608172" comment="dom4j-javadoc-1.6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235635" comment="dom4j-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608173" comment="dom4j-manual-1.6.1-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235636" comment="dom4j-manual is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10690</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7YYGMTZ4T4RLHDVCMQD3K6CDIAXO3O3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P4DQSPUPKAZCPS5MQYTAYGS7YM76UIHZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFIDXN6UAK2I4PPVFPBE4STNQH2FZQ4A/" source="SUSE-SU"/>
    <description>
    A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696</cve>
	<bugzilla href="https://bugzilla.suse.com/1167864">SUSE bug 1167864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606505" comment="buildah-1.17.0-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266828" comment="buildah is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A flaw was found when using samba as an Active Directory Domain Controller. Due to the way samba handles certain requests as an Active Directory Domain Controller LDAP server, an unauthorized user can cause a stack overflow leading to a denial of service. The highest threat from this vulnerability is to system availability. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704</cve>
	<bugzilla href="https://bugzilla.suse.com/1169851">SUSE bug 1169851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607724" comment="ctdb-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607725" comment="ctdb-pcp-pmda-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607726" comment="ctdb-tests-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607727" comment="libdcerpc-binding0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607728" comment="libdcerpc-binding0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607729" comment="libdcerpc-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607730" comment="libdcerpc-samr-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607731" comment="libdcerpc-samr0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607732" comment="libdcerpc-samr0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607733" comment="libdcerpc0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607734" comment="libdcerpc0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607735" comment="libndr-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607736" comment="libndr-krb5pac-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607737" comment="libndr-krb5pac0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607738" comment="libndr-krb5pac0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607739" comment="libndr-nbt-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607740" comment="libndr-nbt0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607741" comment="libndr-nbt0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607742" comment="libndr-standard-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607743" comment="libndr-standard0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607744" comment="libndr-standard0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607745" comment="libndr0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607746" comment="libndr0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607747" comment="libnetapi-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607748" comment="libnetapi0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607749" comment="libnetapi0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607750" comment="libsamba-credentials-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607751" comment="libsamba-credentials0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607752" comment="libsamba-credentials0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607753" comment="libsamba-errors-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607754" comment="libsamba-errors0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607755" comment="libsamba-errors0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607756" comment="libsamba-hostconfig-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607757" comment="libsamba-hostconfig0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607758" comment="libsamba-hostconfig0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607759" comment="libsamba-passdb-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607760" comment="libsamba-passdb0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607761" comment="libsamba-passdb0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607762" comment="libsamba-policy-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607763" comment="libsamba-policy-python-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607764" comment="libsamba-policy-python3-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607765" comment="libsamba-policy0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607766" comment="libsamba-policy0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607767" comment="libsamba-policy0-python3-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607768" comment="libsamba-policy0-python3-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607769" comment="libsamba-util-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607770" comment="libsamba-util0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607771" comment="libsamba-util0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607772" comment="libsamdb-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607773" comment="libsamdb0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607774" comment="libsamdb0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607775" comment="libsmbclient-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607776" comment="libsmbclient0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607777" comment="libsmbclient0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607778" comment="libsmbconf-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607779" comment="libsmbconf0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607780" comment="libsmbconf0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607781" comment="libsmbldap-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607782" comment="libsmbldap2-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607783" comment="libsmbldap2-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607784" comment="libtevent-util-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607785" comment="libtevent-util0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607786" comment="libtevent-util0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607787" comment="libwbclient-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607788" comment="libwbclient0-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607789" comment="libwbclient0-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607790" comment="samba-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607791" comment="samba-ad-dc-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607792" comment="samba-ad-dc-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607793" comment="samba-ceph-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607794" comment="samba-client-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607795" comment="samba-client-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607796" comment="samba-core-devel-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607797" comment="samba-doc-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607798" comment="samba-dsdb-modules-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607799" comment="samba-libs-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607800" comment="samba-libs-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607801" comment="samba-libs-python-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607802" comment="samba-libs-python-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607803" comment="samba-libs-python3-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607804" comment="samba-libs-python3-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607805" comment="samba-pidl-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607806" comment="samba-python-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607807" comment="samba-python3-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607808" comment="samba-test-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607809" comment="samba-winbind-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607810" comment="samba-winbind-32bit-4.9.5+git.317.6d82fb3918b-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10711</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10713</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10713" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007421.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-30"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173456">SUSE bug 1173456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604572" comment="grub2-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604573" comment="grub2-branding-upstream-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604574" comment="grub2-i386-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604575" comment="grub2-i386-pc-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604576" comment="grub2-i386-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604577" comment="grub2-snapper-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604578" comment="grub2-systemd-sleep-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604579" comment="grub2-x86_64-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604580" comment="grub2-x86_64-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10720</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10720" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720</cve>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10722</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10722" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007254.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722</cve>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171930">SUSE bug 1171930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608051" comment="dpdk-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608052" comment="dpdk-devel-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608053" comment="dpdk-doc-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608054" comment="dpdk-examples-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608055" comment="dpdk-kmp-default-18.11.3_k4.12.14_lp151.28.48-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608056" comment="dpdk-tools-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608057" comment="libdpdk-18_11-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10723</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10723" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10723" ref_url="https://www.suse.com/security/cve/CVE-2020-10723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006899.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10723/">CVE-2020-10723</cve>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171925">SUSE bug 1171925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608051" comment="dpdk-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608052" comment="dpdk-devel-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608053" comment="dpdk-doc-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608054" comment="dpdk-examples-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608055" comment="dpdk-kmp-default-18.11.3_k4.12.14_lp151.28.48-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608056" comment="dpdk-tools-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608057" comment="libdpdk-18_11-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10724</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10724" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10724" ref_url="https://www.suse.com/security/cve/CVE-2020-10724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006899.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in DPDK versions 18.11 and above. The vhost-crypto library code is missing validations for user-supplied values, potentially allowing an information leak through an out-of-bounds memory read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10724/">CVE-2020-10724</cve>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171926">SUSE bug 1171926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608051" comment="dpdk-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608052" comment="dpdk-devel-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608053" comment="dpdk-doc-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608054" comment="dpdk-examples-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608055" comment="dpdk-kmp-default-18.11.3_k4.12.14_lp151.28.48-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608056" comment="dpdk-tools-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608057" comment="libdpdk-18_11-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10725</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10725" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10725" ref_url="https://www.suse.com/security/cve/CVE-2020-10725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html" source="SUSE-SU"/>
    <description>
    A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-10725/">CVE-2020-10725</cve>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171927">SUSE bug 1171927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608051" comment="dpdk-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608052" comment="dpdk-devel-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608053" comment="dpdk-doc-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608054" comment="dpdk-examples-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608055" comment="dpdk-kmp-default-18.11.3_k4.12.14_lp151.28.48-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608056" comment="dpdk-tools-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608057" comment="libdpdk-18_11-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10726</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10726" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10726" ref_url="https://www.suse.com/security/cve/CVE-2020-10726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10726/">CVE-2020-10726</cve>
	<bugzilla href="https://bugzilla.suse.com/1171477">SUSE bug 1171477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171929">SUSE bug 1171929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608051" comment="dpdk-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608052" comment="dpdk-devel-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608053" comment="dpdk-doc-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608054" comment="dpdk-examples-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608055" comment="dpdk-kmp-default-18.11.3_k4.12.14_lp151.28.48-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608056" comment="dpdk-tools-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608057" comment="libdpdk-18_11-18.11.3-lp151.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10730</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10730" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0984-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730</cve>
	<bugzilla href="https://bugzilla.suse.com/1173159">SUSE bug 1173159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609250" comment="ctdb-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609251" comment="ctdb-pcp-pmda-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609252" comment="ctdb-tests-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604458" comment="ldb-tools-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609253" comment="libdcerpc-binding0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609254" comment="libdcerpc-binding0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609255" comment="libdcerpc-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609256" comment="libdcerpc-samr-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609257" comment="libdcerpc-samr0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609258" comment="libdcerpc-samr0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609259" comment="libdcerpc0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609260" comment="libdcerpc0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604459" comment="libldb-devel-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604460" comment="libldb1-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152733" comment="libldb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604461" comment="libldb1-32bit-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152734" comment="libldb1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609261" comment="libndr-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609262" comment="libndr-krb5pac-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609263" comment="libndr-krb5pac0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609264" comment="libndr-krb5pac0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609265" comment="libndr-nbt-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609266" comment="libndr-nbt0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609267" comment="libndr-nbt0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609268" comment="libndr-standard-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609269" comment="libndr-standard0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609270" comment="libndr-standard0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609271" comment="libndr0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609272" comment="libndr0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609273" comment="libnetapi-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609274" comment="libnetapi-devel-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609275" comment="libnetapi0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609276" comment="libnetapi0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609277" comment="libsamba-credentials-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609278" comment="libsamba-credentials0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609279" comment="libsamba-credentials0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609280" comment="libsamba-errors-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609281" comment="libsamba-errors0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609282" comment="libsamba-errors0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609283" comment="libsamba-hostconfig-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609284" comment="libsamba-hostconfig0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609285" comment="libsamba-hostconfig0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609286" comment="libsamba-passdb-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609287" comment="libsamba-passdb0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609288" comment="libsamba-passdb0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609289" comment="libsamba-policy-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609290" comment="libsamba-policy-python-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609291" comment="libsamba-policy-python3-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609292" comment="libsamba-policy0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609293" comment="libsamba-policy0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609294" comment="libsamba-policy0-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609295" comment="libsamba-policy0-python3-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609296" comment="libsamba-util-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609297" comment="libsamba-util0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609298" comment="libsamba-util0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609299" comment="libsamdb-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609300" comment="libsamdb0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609301" comment="libsamdb0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609302" comment="libsmbclient-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609303" comment="libsmbclient0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609304" comment="libsmbclient0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609305" comment="libsmbconf-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609306" comment="libsmbconf0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609307" comment="libsmbconf0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609308" comment="libsmbldap-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609309" comment="libsmbldap2-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609310" comment="libsmbldap2-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609311" comment="libtevent-util-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609312" comment="libtevent-util0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609313" comment="libtevent-util0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609314" comment="libwbclient-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609315" comment="libwbclient0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609316" comment="libwbclient0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604462" comment="python-ldb-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177214" comment="python-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604463" comment="python-ldb-32bit-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247518" comment="python-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604464" comment="python-ldb-devel-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247519" comment="python-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604465" comment="python3-ldb-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604466" comment="python3-ldb-32bit-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247521" comment="python3-ldb-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604467" comment="python3-ldb-devel-1.4.6-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247522" comment="python3-ldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609317" comment="samba-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609318" comment="samba-ad-dc-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609319" comment="samba-ad-dc-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609320" comment="samba-ceph-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609321" comment="samba-client-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609322" comment="samba-client-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609323" comment="samba-core-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609324" comment="samba-doc-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609325" comment="samba-dsdb-modules-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609326" comment="samba-libs-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609327" comment="samba-libs-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609328" comment="samba-libs-python-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609329" comment="samba-libs-python-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609330" comment="samba-libs-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609331" comment="samba-libs-python3-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609332" comment="samba-pidl-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609333" comment="samba-python-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609334" comment="samba-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609335" comment="samba-test-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609336" comment="samba-winbind-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609337" comment="samba-winbind-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10732</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10745</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0984-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609250" comment="ctdb-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609251" comment="ctdb-pcp-pmda-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609252" comment="ctdb-tests-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609253" comment="libdcerpc-binding0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609254" comment="libdcerpc-binding0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609255" comment="libdcerpc-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609256" comment="libdcerpc-samr-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609257" comment="libdcerpc-samr0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609258" comment="libdcerpc-samr0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609259" comment="libdcerpc0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609260" comment="libdcerpc0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609261" comment="libndr-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609262" comment="libndr-krb5pac-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609263" comment="libndr-krb5pac0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609264" comment="libndr-krb5pac0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609265" comment="libndr-nbt-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609266" comment="libndr-nbt0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609267" comment="libndr-nbt0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609268" comment="libndr-standard-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609269" comment="libndr-standard0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609270" comment="libndr-standard0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609271" comment="libndr0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609272" comment="libndr0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609273" comment="libnetapi-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609274" comment="libnetapi-devel-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609275" comment="libnetapi0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609276" comment="libnetapi0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609277" comment="libsamba-credentials-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609278" comment="libsamba-credentials0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609279" comment="libsamba-credentials0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609280" comment="libsamba-errors-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609281" comment="libsamba-errors0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609282" comment="libsamba-errors0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609283" comment="libsamba-hostconfig-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609284" comment="libsamba-hostconfig0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609285" comment="libsamba-hostconfig0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609286" comment="libsamba-passdb-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609287" comment="libsamba-passdb0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609288" comment="libsamba-passdb0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609289" comment="libsamba-policy-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609290" comment="libsamba-policy-python-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609291" comment="libsamba-policy-python3-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609292" comment="libsamba-policy0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609293" comment="libsamba-policy0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609294" comment="libsamba-policy0-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609295" comment="libsamba-policy0-python3-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609296" comment="libsamba-util-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609297" comment="libsamba-util0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609298" comment="libsamba-util0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609299" comment="libsamdb-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609300" comment="libsamdb0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609301" comment="libsamdb0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609302" comment="libsmbclient-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609303" comment="libsmbclient0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609304" comment="libsmbclient0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609305" comment="libsmbconf-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609306" comment="libsmbconf0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609307" comment="libsmbconf0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609308" comment="libsmbldap-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609309" comment="libsmbldap2-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609310" comment="libsmbldap2-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609311" comment="libtevent-util-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609312" comment="libtevent-util0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609313" comment="libtevent-util0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609314" comment="libwbclient-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609315" comment="libwbclient0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609316" comment="libwbclient0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609317" comment="samba-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609318" comment="samba-ad-dc-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609319" comment="samba-ad-dc-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609320" comment="samba-ceph-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609321" comment="samba-client-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609322" comment="samba-client-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609323" comment="samba-core-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609324" comment="samba-doc-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609325" comment="samba-dsdb-modules-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609326" comment="samba-libs-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609327" comment="samba-libs-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609328" comment="samba-libs-python-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609329" comment="samba-libs-python-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609330" comment="samba-libs-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609331" comment="samba-libs-python3-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609332" comment="samba-pidl-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609333" comment="samba-python-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609334" comment="samba-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609335" comment="samba-test-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609336" comment="samba-winbind-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609337" comment="samba-winbind-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10749" ref_url="https://www.suse.com/security/cve/CVE-2020-10749" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10749/">CVE-2020-10749</cve>
	<bugzilla href="https://bugzilla.suse.com/1172375">SUSE bug 1172375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172410">SUSE bug 1172410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604373" comment="cni-plugins-0.8.6-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280794" comment="cni-plugins is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174963">SUSE bug 1174963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10753</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10753" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10753" ref_url="https://www.suse.com/security/cve/CVE-2020-10753" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007733.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00062.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10753/">CVE-2020-10753</cve>
	<bugzilla href="https://bugzilla.suse.com/1171921">SUSE bug 1171921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609074" comment="ceph-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609075" comment="ceph-base-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609076" comment="ceph-common-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609077" comment="ceph-dashboard-e2e-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278214" comment="ceph-dashboard-e2e is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609078" comment="ceph-fuse-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609079" comment="ceph-grafana-dashboards-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609080" comment="ceph-mds-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609081" comment="ceph-mgr-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609082" comment="ceph-mgr-dashboard-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609083" comment="ceph-mgr-diskprediction-cloud-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609084" comment="ceph-mgr-diskprediction-local-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609085" comment="ceph-mgr-k8sevents-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609086" comment="ceph-mgr-rook-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609087" comment="ceph-mgr-ssh-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278221" comment="ceph-mgr-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609088" comment="ceph-mon-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609089" comment="ceph-osd-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609090" comment="ceph-prometheus-alerts-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609091" comment="ceph-radosgw-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609092" comment="ceph-resource-agents-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154235" comment="ceph-resource-agents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609093" comment="ceph-test-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609094" comment="cephfs-shell-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609095" comment="libcephfs-devel-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609096" comment="libcephfs2-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609097" comment="librados-devel-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609098" comment="librados2-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609099" comment="libradospp-devel-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609100" comment="libradosstriper-devel-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154241" comment="libradosstriper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609101" comment="libradosstriper1-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154242" comment="libradosstriper1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609102" comment="librbd-devel-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609103" comment="librbd1-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609104" comment="librgw-devel-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609105" comment="librgw2-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609106" comment="python3-ceph-argparse-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609107" comment="python3-cephfs-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609108" comment="python3-rados-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609109" comment="python3-rbd-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609110" comment="python3-rgw-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609111" comment="rados-objclass-devel-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609112" comment="rbd-fuse-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609113" comment="rbd-mirror-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609114" comment="rbd-nbd-14.2.9.970+ged84cae0c9-lp151.2.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10756</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0987-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184743">SUSE bug 1184743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609338" comment="slirp4netns-0.4.7-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266793" comment="slirp4netns is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10757</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10759</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10759" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008596.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0849-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR4WC2OGLKRFBB7HJ3YCZ6PTJUJK67B4/" source="SUSE-SU"/>
    <description>
    A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759</cve>
	<bugzilla href="https://bugzilla.suse.com/1172643">SUSE bug 1172643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608974" comment="dfu-tool-1.0.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286264" comment="dfu-tool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608975" comment="fwupd-1.0.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286265" comment="fwupd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608976" comment="fwupd-devel-1.0.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286266" comment="fwupd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608977" comment="fwupd-lang-1.0.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286267" comment="fwupd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608978" comment="libfwupd2-1.0.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286268" comment="libfwupd2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608979" comment="typelib-1_0-Fwupd-2_0-1.0.9-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286269" comment="typelib-1_0-Fwupd-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10760" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10760" ref_url="https://www.suse.com/security/cve/CVE-2020-10760" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0984-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10760/">CVE-2020-10760</cve>
	<bugzilla href="https://bugzilla.suse.com/1173161">SUSE bug 1173161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609250" comment="ctdb-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609251" comment="ctdb-pcp-pmda-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609252" comment="ctdb-tests-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609253" comment="libdcerpc-binding0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609254" comment="libdcerpc-binding0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609255" comment="libdcerpc-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609256" comment="libdcerpc-samr-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609257" comment="libdcerpc-samr0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609258" comment="libdcerpc-samr0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609259" comment="libdcerpc0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609260" comment="libdcerpc0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609261" comment="libndr-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609262" comment="libndr-krb5pac-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609263" comment="libndr-krb5pac0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609264" comment="libndr-krb5pac0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609265" comment="libndr-nbt-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609266" comment="libndr-nbt0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609267" comment="libndr-nbt0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609268" comment="libndr-standard-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609269" comment="libndr-standard0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609270" comment="libndr-standard0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609271" comment="libndr0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609272" comment="libndr0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609273" comment="libnetapi-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609274" comment="libnetapi-devel-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609275" comment="libnetapi0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609276" comment="libnetapi0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609277" comment="libsamba-credentials-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609278" comment="libsamba-credentials0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609279" comment="libsamba-credentials0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609280" comment="libsamba-errors-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609281" comment="libsamba-errors0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609282" comment="libsamba-errors0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609283" comment="libsamba-hostconfig-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609284" comment="libsamba-hostconfig0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609285" comment="libsamba-hostconfig0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609286" comment="libsamba-passdb-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609287" comment="libsamba-passdb0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609288" comment="libsamba-passdb0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609289" comment="libsamba-policy-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609290" comment="libsamba-policy-python-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609291" comment="libsamba-policy-python3-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609292" comment="libsamba-policy0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609293" comment="libsamba-policy0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609294" comment="libsamba-policy0-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609295" comment="libsamba-policy0-python3-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609296" comment="libsamba-util-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609297" comment="libsamba-util0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609298" comment="libsamba-util0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609299" comment="libsamdb-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609300" comment="libsamdb0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609301" comment="libsamdb0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609302" comment="libsmbclient-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609303" comment="libsmbclient0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609304" comment="libsmbclient0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609305" comment="libsmbconf-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609306" comment="libsmbconf0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609307" comment="libsmbconf0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609308" comment="libsmbldap-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609309" comment="libsmbldap2-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609310" comment="libsmbldap2-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609311" comment="libtevent-util-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609312" comment="libtevent-util0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609313" comment="libtevent-util0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609314" comment="libwbclient-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609315" comment="libwbclient0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609316" comment="libwbclient0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609317" comment="samba-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609318" comment="samba-ad-dc-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609319" comment="samba-ad-dc-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609320" comment="samba-ceph-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609321" comment="samba-client-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609322" comment="samba-client-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609323" comment="samba-core-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609324" comment="samba-doc-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609325" comment="samba-dsdb-modules-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609326" comment="samba-libs-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609327" comment="samba-libs-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609328" comment="samba-libs-python-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609329" comment="samba-libs-python-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609330" comment="samba-libs-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609331" comment="samba-libs-python3-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609332" comment="samba-pidl-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609333" comment="samba-python-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609334" comment="samba-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609335" comment="samba-test-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609336" comment="samba-winbind-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609337" comment="samba-winbind-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10766</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10766" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10768</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
    <description>
    A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769</cve>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10773</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A stack information leak flaw was found in s390/s390x in the Linux kernel’s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10802" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10802" ref_url="https://www.suse.com/security/cve/CVE-2020-10802" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" source="SUSE-SU"/>
    <description>
    In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10802/">CVE-2020-10802</cve>
	<bugzilla href="https://bugzilla.suse.com/1167336">SUSE bug 1167336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609827" comment="phpMyAdmin-4.9.7-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10803" ref_url="https://www.suse.com/security/cve/CVE-2020-10803" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" source="SUSE-SU"/>
    <description>
    In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10803/">CVE-2020-10803</cve>
	<bugzilla href="https://bugzilla.suse.com/1167337">SUSE bug 1167337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609827" comment="phpMyAdmin-4.9.7-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10804</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10804" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10804" ref_url="https://www.suse.com/security/cve/CVE-2020-10804" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" source="SUSE-SU"/>
    <description>
    In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10804/">CVE-2020-10804</cve>
	<bugzilla href="https://bugzilla.suse.com/1167335">SUSE bug 1167335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609827" comment="phpMyAdmin-4.9.7-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10878</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" source="SUSE-SU"/>
    <description>
    Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609004" comment="perl-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609005" comment="perl-32bit-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609006" comment="perl-base-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609007" comment="perl-base-32bit-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153231" comment="perl-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609008" comment="perl-doc-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10933</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10933" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006711.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933</cve>
	<bugzilla href="https://bugzilla.suse.com/1168938">SUSE bug 1168938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607673" comment="libruby2_5-2_5-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607674" comment="ruby2.5-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607675" comment="ruby2.5-devel-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607676" comment="ruby2.5-devel-extra-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607677" comment="ruby2.5-doc-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607678" comment="ruby2.5-doc-ri-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607679" comment="ruby2.5-stdlib-2.5.8-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10938</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10938" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10938" ref_url="https://www.suse.com/security/cve/CVE-2020-10938" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00051.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick before 1.3.35 has an integer overflow and resultant heap-based buffer overflow in HuffmanDecodeImage in magick/compress.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-10938/">CVE-2020-10938</cve>
	<bugzilla href="https://bugzilla.suse.com/1167623">SUSE bug 1167623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607322" comment="GraphicsMagick-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607323" comment="GraphicsMagick-devel-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607324" comment="libGraphicsMagick++-Q16-12-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607325" comment="libGraphicsMagick++-devel-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607326" comment="libGraphicsMagick-Q16-3-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607327" comment="libGraphicsMagick3-config-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607328" comment="libGraphicsMagickWand-Q16-2-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607329" comment="perl-GraphicsMagick-1.3.29-lp151.4.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10942</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607559" comment="kernel-debug-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607560" comment="kernel-debug-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607561" comment="kernel-debug-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607562" comment="kernel-default-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607563" comment="kernel-default-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607564" comment="kernel-default-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607565" comment="kernel-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607566" comment="kernel-docs-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607567" comment="kernel-docs-html-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607568" comment="kernel-kvmsmall-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607571" comment="kernel-macros-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607572" comment="kernel-obs-build-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607573" comment="kernel-obs-qa-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607574" comment="kernel-source-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607575" comment="kernel-source-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607576" comment="kernel-syms-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607577" comment="kernel-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607578" comment="kernel-vanilla-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607579" comment="kernel-vanilla-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10957</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10957" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10957" ref_url="https://www.suse.com/security/cve/CVE-2020-10957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006845.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00059.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.10.1, unauthenticated sending of malformed parameters to a NOOP command causes a NULL Pointer Dereference and crash in submission-login, submission, or lmtp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10957/">CVE-2020-10957</cve>
	<bugzilla href="https://bugzilla.suse.com/1171457">SUSE bug 1171457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608174" comment="dovecot23-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608175" comment="dovecot23-backend-mysql-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608176" comment="dovecot23-backend-pgsql-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608177" comment="dovecot23-backend-sqlite-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608178" comment="dovecot23-devel-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608179" comment="dovecot23-fts-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608180" comment="dovecot23-fts-lucene-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608181" comment="dovecot23-fts-solr-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608182" comment="dovecot23-fts-squat-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10958</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10958" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10958" ref_url="https://www.suse.com/security/cve/CVE-2020-10958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006845.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00059.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.10.1, a crafted SMTP/LMTP message triggers an unauthenticated use-after-free bug in submission-login, submission, or lmtp, and can lead to a crash under circumstances involving many newlines after a command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10958/">CVE-2020-10958</cve>
	<bugzilla href="https://bugzilla.suse.com/1171458">SUSE bug 1171458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608174" comment="dovecot23-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608175" comment="dovecot23-backend-mysql-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608176" comment="dovecot23-backend-pgsql-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608177" comment="dovecot23-backend-sqlite-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608178" comment="dovecot23-devel-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608179" comment="dovecot23-fts-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608180" comment="dovecot23-fts-lucene-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608181" comment="dovecot23-fts-solr-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608182" comment="dovecot23-fts-squat-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10967</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10967" ref_url="https://www.suse.com/security/cve/CVE-2020-10967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006845.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00059.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.10.1, remote unauthenticated attackers can crash the lmtp or submission process by sending mail with an empty localpart.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10967/">CVE-2020-10967</cve>
	<bugzilla href="https://bugzilla.suse.com/1171456">SUSE bug 1171456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608174" comment="dovecot23-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608175" comment="dovecot23-backend-mysql-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608176" comment="dovecot23-backend-pgsql-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608177" comment="dovecot23-backend-sqlite-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608178" comment="dovecot23-devel-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608179" comment="dovecot23-fts-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608180" comment="dovecot23-fts-lucene-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608181" comment="dovecot23-fts-solr-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608182" comment="dovecot23-fts-squat-2.3.10-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10995</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10995" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10995" ref_url="https://www.suse.com/security/cve/CVE-2020-10995" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" source="SUSE-SU"/>
    <description>
    PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect. This is triggered by random subdomains in the NSDNAME in NS records. PowerDNS Recursor 4.1.16, 4.2.2 and 4.3.1 contain a mitigation to limit the impact of this DNS protocol issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10995/">CVE-2020-10995</cve>
	<bugzilla href="https://bugzilla.suse.com/1171553">SUSE bug 1171553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609825" comment="pdns-recursor-4.1.12-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153799" comment="pdns-recursor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open for an exploit where _some_ credential is leaked (but the attacker cannot control which one). Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that are considered illegal as of the recently published Git versions can cause Git to send a "blank" pattern to helpers, missing hostname and protocol fields. Many helpers will interpret this as matching _any_ URL, and will return some unspecified stored password, leaking the password to an attacker's server. The vulnerability can be triggered by feeding a malicious URL to `git clone`. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The root of the problem is in Git itself, which should not be feeding blank input to helpers. However, the ability to exploit the vulnerability in practice depends on which helpers are in use. Credential helpers which are known to trigger the vulnerability: - Git's "store" helper - Git's "cache" helper - the "osxkeychain" helper that ships in Git's "contrib" directory Credential helpers which are known to be safe even with vulnerable versions of Git: - Git Credential Manager for Windows Any helper not in this list should be assumed to trigger the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008</cve>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11017</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11017" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11017" ref_url="https://www.suse.com/security/cve/CVE-2020-11017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, by providing manipulated input a malicious client can create a double free condition and crash the server. This is fixed in version 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11017/">CVE-2020-11017</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11018</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11018" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11018" ref_url="https://www.suse.com/security/cve/CVE-2020-11018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11018/">CVE-2020-11018</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11019</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11019" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11019" ref_url="https://www.suse.com/security/cve/CVE-2020-11019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, when running with logger set to "WLOG_TRACE", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to local terminal. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11019/">CVE-2020-11019</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11022</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11022" ref_url="https://www.suse.com/security/cve/CVE-2020-11022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007435.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1888-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html" source="SUSE-SU"/>
    <description>
    In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11022/">CVE-2020-11022</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178434">SUSE bug 1178434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190663">SUSE bug 1190663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609828" comment="cacti-1.2.13-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609829" comment="cacti-spine-1.2.13-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609830" comment="otrs-6.0.30-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609831" comment="otrs-doc-6.0.30-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609832" comment="otrs-itsm-6.0.30-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1888-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html" source="SUSE-SU"/>
    <description>
    In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing &lt;option&gt; elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178434">SUSE bug 1178434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190660">SUSE bug 1190660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609828" comment="cacti-1.2.13-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609829" comment="cacti-spine-1.2.13-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609830" comment="otrs-6.0.30-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609831" comment="otrs-doc-6.0.30-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609832" comment="otrs-itsm-6.0.30-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11038</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11038" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11038" ref_url="https://www.suse.com/security/cve/CVE-2020-11038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, an Integer Overflow to Buffer Overflow exists. When using /video redirection, a manipulated server can instruct the client to allocate a buffer with a smaller size than requested due to an integer overflow in size calculation. With later messages, the server can manipulate the client to write data out of bound to the previously allocated buffer. This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11038/">CVE-2020-11038</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11039" ref_url="https://www.suse.com/security/cve/CVE-2020-11039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, when using a manipulated server with USB redirection enabled (nearly) arbitrary memory can be read and written due to integer overflows in length checks. This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11039/">CVE-2020-11039</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11040</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11040" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11040" ref_url="https://www.suse.com/security/cve/CVE-2020-11040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bound data read from memory in clear_decompress_subcode_rlex, visualized on screen as color. This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11040/">CVE-2020-11040</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11041</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11041" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11041" ref_url="https://www.suse.com/security/cve/CVE-2020-11041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11041/">CVE-2020-11041</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11043</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11043" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11043" ref_url="https://www.suse.com/security/cve/CVE-2020-11043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11043/">CVE-2020-11043</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11076</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11076" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076</cve>
	<bugzilla href="https://bugzilla.suse.com/1172175">SUSE bug 1172175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172176">SUSE bug 1172176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609343" comment="ruby2.5-rubygem-puma-4.3.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287506" comment="ruby2.5-rubygem-puma is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609344" comment="ruby2.5-rubygem-puma-doc-4.3.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287507" comment="ruby2.5-rubygem-puma-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11077</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11077" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11077" ref_url="https://www.suse.com/security/cve/CVE-2020-11077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. This is a similar but different vulnerability from CVE-2020-11076. The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11077/">CVE-2020-11077</cve>
	<bugzilla href="https://bugzilla.suse.com/1172175">SUSE bug 1172175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172176">SUSE bug 1172176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609343" comment="ruby2.5-rubygem-puma-4.3.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287506" comment="ruby2.5-rubygem-puma is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609344" comment="ruby2.5-rubygem-puma-doc-4.3.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287507" comment="ruby2.5-rubygem-puma-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11080</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11080" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FQEUDKQEBT4RUZ2JLDQBWSAYUJ4SCTW/" source="SUSE-SU"/>
    <description>
    In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., &gt; 32), then drop the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<bugzilla href="https://bugzilla.suse.com/1172441">SUSE bug 1172441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172442">SUSE bug 1172442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608569" comment="nodejs8-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608570" comment="nodejs8-devel-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608571" comment="nodejs8-docs-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608572" comment="npm8-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11085</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11085" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11085" ref_url="https://www.suse.com/security/cve/CVE-2020-11085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before 2.1.0, there is an out-of-bounds read in cliprdr_read_format_list. Clipboard format data read (by client or server) might read data out-of-bounds. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11085/">CVE-2020-11085</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11086</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11086" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11086" ref_url="https://www.suse.com/security/cve/CVE-2020-11086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes out-of-bound to an internal structure. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11086/">CVE-2020-11086</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11087</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11087" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11087" ref_url="https://www.suse.com/security/cve/CVE-2020-11087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11087/">CVE-2020-11087</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11088</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11088" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11088" ref_url="https://www.suse.com/security/cve/CVE-2020-11088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_NegotiateMessage. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11088/">CVE-2020-11088</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11089</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11089" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11089" ref_url="https://www.suse.com/security/cve/CVE-2020-11089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before 2.1.0, there is an out-of-bound read in irp functions (parallel_process_irp_create, serial_process_irp_create, drive_process_irp_write, printer_process_irp_write, rdpei_recv_pdu, serial_process_irp_write). This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11089/">CVE-2020-11089</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11095</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11095" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11095" ref_url="https://www.suse.com/security/cve/CVE-2020-11095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before version 2.1.2, an out of bound reads occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11095/">CVE-2020-11095</cve>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11096</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11096" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11096" ref_url="https://www.suse.com/security/cve/CVE-2020-11096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before version 2.1.2, there is a global OOB read in update_read_cache_bitmap_v3_order. As a workaround, one can disable bitmap cache with -bitmap-cache (default). This is fixed in version 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11096/">CVE-2020-11096</cve>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11097</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11097" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11097" ref_url="https://www.suse.com/security/cve/CVE-2020-11097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before version 2.1.2, an out of bounds read occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11097/">CVE-2020-11097</cve>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11098</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11098" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11098" ref_url="https://www.suse.com/security/cve/CVE-2020-11098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before version 2.1.2, there is an out-of-bound read in glyph_cache_put. This affects all FreeRDP clients with `+glyph-cache` option enabled This is fixed in version 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11098/">CVE-2020-11098</cve>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11099</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11099" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11099" ref_url="https://www.suse.com/security/cve/CVE-2020-11099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before version 2.1.2, there is an out of bounds read in license_read_new_or_upgrade_license_packet. A manipulated license packet can lead to out of bound reads to an internal buffer. This is fixed in version 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11099/">CVE-2020-11099</cve>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11100</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11100" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11100" ref_url="https://www.suse.com/security/cve/CVE-2020-11100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006668.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00002.html" source="SUSE-SU"/>
    <description>
    In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11100/">CVE-2020-11100</cve>
	<bugzilla href="https://bugzilla.suse.com/1168023">SUSE bug 1168023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607337" comment="haproxy-2.0.10+git0.ac198b92-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11494</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607559" comment="kernel-debug-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607560" comment="kernel-debug-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607561" comment="kernel-debug-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607562" comment="kernel-default-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607563" comment="kernel-default-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607564" comment="kernel-default-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607565" comment="kernel-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607566" comment="kernel-docs-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607567" comment="kernel-docs-html-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607568" comment="kernel-kvmsmall-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607571" comment="kernel-macros-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607572" comment="kernel-obs-build-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607573" comment="kernel-obs-qa-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607574" comment="kernel-source-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607575" comment="kernel-source-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607576" comment="kernel-syms-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607577" comment="kernel-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607578" comment="kernel-vanilla-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607579" comment="kernel-vanilla-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11501</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11501" ref_url="https://www.suse.com/security/cve/CVE-2020-11501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006686.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html" source="SUSE-SU"/>
    <description>
    GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11501/">CVE-2020-11501</cve>
	<bugzilla href="https://bugzilla.suse.com/1168345">SUSE bug 1168345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607483" comment="gmp-devel-6.1.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281482" comment="gmp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607484" comment="gmp-devel-32bit-6.1.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281483" comment="gmp-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607485" comment="gnutls-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607486" comment="gnutls-guile-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235743" comment="gnutls-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607487" comment="libgmp10-6.1.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281484" comment="libgmp10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607488" comment="libgmp10-32bit-6.1.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281485" comment="libgmp10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607489" comment="libgmpxx4-6.1.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281486" comment="libgmpxx4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607490" comment="libgmpxx4-32bit-6.1.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281487" comment="libgmpxx4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607491" comment="libgnutls-dane-devel-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235744" comment="libgnutls-dane-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607492" comment="libgnutls-dane0-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177127" comment="libgnutls-dane0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607493" comment="libgnutls-devel-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607494" comment="libgnutls-devel-32bit-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607495" comment="libgnutls30-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607496" comment="libgnutls30-32bit-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235745" comment="libgnutls30-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607497" comment="libgnutls30-hmac-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607498" comment="libgnutls30-hmac-32bit-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281489" comment="libgnutls30-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607499" comment="libgnutlsxx-devel-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607500" comment="libgnutlsxx28-3.6.7-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607501" comment="libhogweed4-3.4.1-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177221" comment="libhogweed4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607502" comment="libhogweed4-32bit-3.4.1-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242425" comment="libhogweed4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607503" comment="libnettle-devel-3.4.1-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153225" comment="libnettle-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607504" comment="libnettle-devel-32bit-3.4.1-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153226" comment="libnettle-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607505" comment="libnettle6-3.4.1-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177222" comment="libnettle6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607506" comment="libnettle6-32bit-3.4.1-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242426" comment="libnettle6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607507" comment="nettle-3.4.1-lp151.2.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153229" comment="nettle is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11521</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11521" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11521" ref_url="https://www.suse.com/security/cve/CVE-2020-11521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    libfreerdp/codec/planar.c in FreeRDP version &gt; 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11521/">CVE-2020-11521</cve>
	<bugzilla href="https://bugzilla.suse.com/1169413">SUSE bug 1169413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171443">SUSE bug 1171443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11522</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11522" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11522" ref_url="https://www.suse.com/security/cve/CVE-2020-11522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    libfreerdp/gdi/gdi.c in FreeRDP &gt; 1.0 through 2.0.0-rc4 has an Out-of-bounds Read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11522/">CVE-2020-11522</cve>
	<bugzilla href="https://bugzilla.suse.com/1169413">SUSE bug 1169413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171444">SUSE bug 1171444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11523</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11523" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11523" ref_url="https://www.suse.com/security/cve/CVE-2020-11523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    libfreerdp/gdi/region.c in FreeRDP versions &gt; 1.0 through 2.0.0-rc4 has an Integer Overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11523/">CVE-2020-11523</cve>
	<bugzilla href="https://bugzilla.suse.com/1169413">SUSE bug 1169413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171445">SUSE bug 1171445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11524</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11524" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11524" ref_url="https://www.suse.com/security/cve/CVE-2020-11524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    libfreerdp/codec/interleaved.c in FreeRDP versions &gt; 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11524/">CVE-2020-11524</cve>
	<bugzilla href="https://bugzilla.suse.com/1169413">SUSE bug 1169413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171446">SUSE bug 1171446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11525</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11525" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11525" ref_url="https://www.suse.com/security/cve/CVE-2020-11525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    libfreerdp/cache/bitmap.c in FreeRDP versions &gt; 1.0 through 2.0.0-rc4 has an Out of bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-11525/">CVE-2020-11525</cve>
	<bugzilla href="https://bugzilla.suse.com/1169413">SUSE bug 1169413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171447">SUSE bug 1171447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11526</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11526" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11526" ref_url="https://www.suse.com/security/cve/CVE-2020-11526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    libfreerdp/core/update.c in FreeRDP versions &gt; 1.1 through 2.0.0-rc4 has an Out-of-bounds Read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-11526/">CVE-2020-11526</cve>
	<bugzilla href="https://bugzilla.suse.com/1169413">SUSE bug 1169413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171674">SUSE bug 1171674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11608</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11609</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609</cve>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11647</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11647" ref_url="https://www.suse.com/security/cve/CVE-2020-11647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15, the BACapp dissector could crash. This was addressed in epan/dissectors/packet-bacapp.c by limiting the amount of recursion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11647/">CVE-2020-11647</cve>
	<bugzilla href="https://bugzilla.suse.com/1169063">SUSE bug 1169063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604597" comment="libwireshark13-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604598" comment="libwiretap10-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604599" comment="libwsutil11-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604600" comment="wireshark-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604601" comment="wireshark-devel-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604602" comment="wireshark-ui-qt-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11651</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11651" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="TID000019619" ref_url="https://www.suse.com/support/kb/doc/?id=000019619" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-30"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651</cve>
	<bugzilla href="https://bugzilla.suse.com/1170595">SUSE bug 1170595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604403" comment="python2-salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604404" comment="python3-salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604405" comment="salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604406" comment="salt-api-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604407" comment="salt-bash-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604408" comment="salt-cloud-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604409" comment="salt-doc-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604410" comment="salt-fish-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604411" comment="salt-master-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604412" comment="salt-minion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604413" comment="salt-proxy-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604414" comment="salt-ssh-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604415" comment="salt-standalone-formulas-configuration-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604416" comment="salt-syndic-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604417" comment="salt-zsh-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11652</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="TID000019619" ref_url="https://www.suse.com/support/kb/doc/?id=000019619" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-30"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652</cve>
	<bugzilla href="https://bugzilla.suse.com/1170595">SUSE bug 1170595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604403" comment="python2-salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604404" comment="python3-salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604405" comment="salt-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604406" comment="salt-api-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604407" comment="salt-bash-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604408" comment="salt-cloud-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604409" comment="salt-doc-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604410" comment="salt-fish-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604411" comment="salt-master-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604412" comment="salt-minion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604413" comment="salt-proxy-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604414" comment="salt-ssh-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604415" comment="salt-standalone-formulas-configuration-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604416" comment="salt-syndic-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604417" comment="salt-zsh-completion-3000-lp151.5.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11653</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11653" ref_url="https://www.suse.com/security/cve/CVE-2020-11653" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0808-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11653/">CVE-2020-11653</cve>
	<bugzilla href="https://bugzilla.suse.com/1169039">SUSE bug 1169039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608822" comment="libvarnishapi2-6.2.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265429" comment="libvarnishapi2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608823" comment="varnish-6.2.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265431" comment="varnish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608824" comment="varnish-devel-6.2.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265433" comment="varnish-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11668</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11669</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11669" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11669" ref_url="https://www.suse.com/security/cve/CVE-2020-11669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11669/">CVE-2020-11669</cve>
	<bugzilla href="https://bugzilla.suse.com/1169390">SUSE bug 1169390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607559" comment="kernel-debug-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607560" comment="kernel-debug-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607561" comment="kernel-debug-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607562" comment="kernel-default-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607563" comment="kernel-default-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607564" comment="kernel-default-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607565" comment="kernel-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607566" comment="kernel-docs-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607567" comment="kernel-docs-html-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607568" comment="kernel-kvmsmall-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607571" comment="kernel-macros-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607572" comment="kernel-obs-build-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607573" comment="kernel-obs-qa-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607574" comment="kernel-source-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607575" comment="kernel-source-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607576" comment="kernel-syms-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607577" comment="kernel-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607578" comment="kernel-vanilla-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607579" comment="kernel-vanilla-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11722</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11722" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11722" ref_url="https://www.suse.com/security/cve/CVE-2020-11722" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00037.html" source="SUSE-SU"/>
    <description>
    Dungeon Crawl Stone Soup (aka DCSS or crawl) before 0.25 allows remote attackers to execute arbitrary code via Lua bytecode embedded in an uploaded .crawlrc file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-11722/">CVE-2020-11722</cve>
	<bugzilla href="https://bugzilla.suse.com/1169381">SUSE bug 1169381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609833" comment="crawl-0.24.0-lp151.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281911" comment="crawl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609834" comment="crawl-data-0.24.0-lp151.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281912" comment="crawl-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609835" comment="crawl-sdl-0.24.0-lp151.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281913" comment="crawl-sdl is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11736</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11736" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11736" ref_url="https://www.suse.com/security/cve/CVE-2020-11736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00035.html" source="SUSE-SU"/>
    <description>
    fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11736/">CVE-2020-11736</cve>
	<bugzilla href="https://bugzilla.suse.com/1169428">SUSE bug 1169428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189131">SUSE bug 1189131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608834" comment="file-roller-3.26.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153800" comment="file-roller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608835" comment="file-roller-lang-3.26.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153801" comment="file-roller-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11739</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11739" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739</cve>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607706" comment="xen-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607707" comment="xen-devel-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607708" comment="xen-doc-html-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607709" comment="xen-libs-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607710" comment="xen-libs-32bit-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607711" comment="xen-tools-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607712" comment="xen-tools-domU-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11740</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11740" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607706" comment="xen-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607707" comment="xen-devel-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607708" comment="xen-doc-html-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607709" comment="xen-libs-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607710" comment="xen-libs-32bit-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607711" comment="xen-tools-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607712" comment="xen-tools-domU-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11741</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11741" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607706" comment="xen-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607707" comment="xen-devel-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607708" comment="xen-doc-html-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607709" comment="xen-libs-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607710" comment="xen-libs-32bit-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607711" comment="xen-tools-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607712" comment="xen-tools-domU-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11742</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11742" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607706" comment="xen-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607707" comment="xen-devel-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607708" comment="xen-doc-html-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607709" comment="xen-libs-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607710" comment="xen-libs-32bit-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607711" comment="xen-tools-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607712" comment="xen-tools-domU-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11743</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11743" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11743" ref_url="https://www.suse.com/security/cve/CVE-2020-11743" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11743/">CVE-2020-11743</cve>
	<bugzilla href="https://bugzilla.suse.com/1168143">SUSE bug 1168143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607706" comment="xen-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607707" comment="xen-devel-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607708" comment="xen-doc-html-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607709" comment="xen-libs-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607710" comment="xen-libs-32bit-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607711" comment="xen-tools-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607712" comment="xen-tools-domU-4.12.2_04-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11758</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11758" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11758" ref_url="https://www.suse.com/security/cve/CVE-2020-11758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read in ImfOptimizedPixelReading.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11758/">CVE-2020-11758</cve>
	<bugzilla href="https://bugzilla.suse.com/1169549">SUSE bug 1169549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169573">SUSE bug 1169573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169574">SUSE bug 1169574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608041" comment="libIlmImf-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608042" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608043" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608044" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608045" comment="openexr-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608046" comment="openexr-devel-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608047" comment="openexr-doc-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11760" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11760" ref_url="https://www.suse.com/security/cve/CVE-2020-11760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read during RLE uncompression in rleUncompress in ImfRle.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11760/">CVE-2020-11760</cve>
	<bugzilla href="https://bugzilla.suse.com/1169580">SUSE bug 1169580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608041" comment="libIlmImf-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608042" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608043" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608044" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608045" comment="openexr-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608046" comment="openexr-devel-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608047" comment="openexr-doc-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11761</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11761" ref_url="https://www.suse.com/security/cve/CVE-2020-11761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder::refill in ImfFastHuf.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11761/">CVE-2020-11761</cve>
	<bugzilla href="https://bugzilla.suse.com/1169578">SUSE bug 1169578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608041" comment="libIlmImf-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608042" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608043" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608044" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608045" comment="openexr-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608046" comment="openexr-devel-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608047" comment="openexr-doc-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11762</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11762" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11762" ref_url="https://www.suse.com/security/cve/CVE-2020-11762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read and write in DwaCompressor::uncompress in ImfDwaCompressor.cpp when handling the UNKNOWN compression case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11762/">CVE-2020-11762</cve>
	<bugzilla href="https://bugzilla.suse.com/1169549">SUSE bug 1169549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169573">SUSE bug 1169573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169574">SUSE bug 1169574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169575">SUSE bug 1169575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169576">SUSE bug 1169576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169578">SUSE bug 1169578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169579">SUSE bug 1169579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169580">SUSE bug 1169580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608041" comment="libIlmImf-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608042" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608043" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608044" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608045" comment="openexr-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608046" comment="openexr-devel-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608047" comment="openexr-doc-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11763</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11763" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an std::vector out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763</cve>
	<bugzilla href="https://bugzilla.suse.com/1169576">SUSE bug 1169576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608041" comment="libIlmImf-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608042" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608043" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608044" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608045" comment="openexr-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608046" comment="openexr-devel-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608047" comment="openexr-doc-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11764</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11764" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764</cve>
	<bugzilla href="https://bugzilla.suse.com/1169574">SUSE bug 1169574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608041" comment="libIlmImf-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608042" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608043" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608044" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608045" comment="openexr-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608046" comment="openexr-devel-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608047" comment="openexr-doc-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11765" ref_url="https://www.suse.com/security/cve/CVE-2020-11765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00051.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an off-by-one error in use of the ImfXdr.h read function by DwaCompressor::Classifier::Classifier, leading to an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11765/">CVE-2020-11765</cve>
	<bugzilla href="https://bugzilla.suse.com/1169575">SUSE bug 1169575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608041" comment="libIlmImf-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608042" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608043" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608044" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608045" comment="openexr-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608046" comment="openexr-devel-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608047" comment="openexr-doc-2.2.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11793</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00008.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793</cve>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607811" comment="libjavascriptcoregtk-4_0-18-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607812" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607813" comment="libwebkit2gtk-4_0-37-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607814" comment="libwebkit2gtk-4_0-37-32bit-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607815" comment="libwebkit2gtk3-lang-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607816" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607817" comment="typelib-1_0-WebKit2-4_0-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607818" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607819" comment="webkit-jsc-4-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607820" comment="webkit2gtk-4_0-injected-bundles-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607821" comment="webkit2gtk3-devel-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607822" comment="webkit2gtk3-minibrowser-2.28.1-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11800</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11800" ref_url="https://www.suse.com/security/cve/CVE-2020-11800" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html" source="SUSE-SU"/>
    <description>
    Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11800/">CVE-2020-11800</cve>
	<bugzilla href="https://bugzilla.suse.com/1177467">SUSE bug 1177467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609836" comment="zabbix-agent-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294885" comment="zabbix-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609837" comment="zabbix-bash-completion-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294887" comment="zabbix-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609838" comment="zabbix-java-gateway-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294889" comment="zabbix-java-gateway is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609839" comment="zabbix-phpfrontend-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294891" comment="zabbix-phpfrontend is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609840" comment="zabbix-proxy-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294893" comment="zabbix-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609841" comment="zabbix-proxy-mysql-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294895" comment="zabbix-proxy-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609842" comment="zabbix-proxy-postgresql-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294897" comment="zabbix-proxy-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609843" comment="zabbix-proxy-sqlite-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294899" comment="zabbix-proxy-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609844" comment="zabbix-server-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294901" comment="zabbix-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609845" comment="zabbix-server-mysql-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294903" comment="zabbix-server-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609846" comment="zabbix-server-postgresql-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294905" comment="zabbix-server-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609847" comment="zabbix-server-sqlite-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294907" comment="zabbix-server-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11863" ref_url="https://www.suse.com/security/cve/CVE-2020-11863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1621-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html" source="SUSE-SU"/>
    <description>
    libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 1 of 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11863/">CVE-2020-11863</cve>
	<bugzilla href="https://bugzilla.suse.com/1171496">SUSE bug 1171496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608841" comment="libEMF-devel-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285808" comment="libEMF-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608842" comment="libEMF-utils-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285809" comment="libEMF-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608843" comment="libEMF1-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285810" comment="libEMF1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11864</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11864" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11864" ref_url="https://www.suse.com/security/cve/CVE-2020-11864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1621-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html" source="SUSE-SU"/>
    <description>
    libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 2 of 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11864/">CVE-2020-11864</cve>
	<bugzilla href="https://bugzilla.suse.com/1171499">SUSE bug 1171499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608841" comment="libEMF-devel-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285808" comment="libEMF-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608842" comment="libEMF-utils-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285809" comment="libEMF-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608843" comment="libEMF1-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285810" comment="libEMF1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11865</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11865" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11865" ref_url="https://www.suse.com/security/cve/CVE-2020-11865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1621-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html" source="SUSE-SU"/>
    <description>
    libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11865/">CVE-2020-11865</cve>
	<bugzilla href="https://bugzilla.suse.com/1171497">SUSE bug 1171497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608841" comment="libEMF-devel-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285808" comment="libEMF-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608842" comment="libEMF-utils-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285809" comment="libEMF-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608843" comment="libEMF1-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285810" comment="libEMF1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11866</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11866" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11866" ref_url="https://www.suse.com/security/cve/CVE-2020-11866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1621-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00036.html" source="SUSE-SU"/>
    <description>
    libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-11866/">CVE-2020-11866</cve>
	<bugzilla href="https://bugzilla.suse.com/1171498">SUSE bug 1171498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608841" comment="libEMF-devel-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285808" comment="libEMF-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608842" comment="libEMF-utils-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285809" comment="libEMF-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608843" comment="libEMF1-1.0.7-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285810" comment="libEMF1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11867</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11867" ref_url="https://www.suse.com/security/cve/CVE-2020-11867" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIO5YFJW5KODA2NDQAAMKAOM57Z2ZM4W/" source="SUSE-SU"/>
    <description>
    Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-11867/">CVE-2020-11867</cve>
	<bugzilla href="https://bugzilla.suse.com/1179449">SUSE bug 1179449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609848" comment="audacity-2.2.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338701" comment="audacity is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609849" comment="audacity-lang-2.2.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338703" comment="audacity-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11868</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11868" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609184" comment="ntp-4.2.8p15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609185" comment="ntp-doc-4.2.8p15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11888</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11888" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11888" ref_url="https://www.suse.com/security/cve/CVE-2020-11888" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0651-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0656-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00035.html" source="SUSE-SU"/>
    <description>
    python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11888/">CVE-2020-11888</cve>
	<bugzilla href="https://bugzilla.suse.com/1171379">SUSE bug 1171379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607963" comment="python2-markdown2-2.3.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283130" comment="python2-markdown2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607964" comment="python3-markdown2-2.3.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283131" comment="python3-markdown2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11945</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11945" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607858" comment="squid-4.11-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11984</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11984" ref_url="https://www.suse.com/security/cve/CVE-2020-11984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007308.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html" source="SUSE-SU"/>
    <description>
    Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11984/">CVE-2020-11984</cve>
	<bugzilla href="https://bugzilla.suse.com/1175074">SUSE bug 1175074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605009" comment="apache2-2.4.33-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605010" comment="apache2-devel-2.4.33-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605011" comment="apache2-doc-2.4.33-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605012" comment="apache2-event-2.4.33-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605013" comment="apache2-example-pages-2.4.33-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605014" comment="apache2-prefork-2.4.33-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605015" comment="apache2-utils-2.4.33-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605016" comment="apache2-worker-2.4.33-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11993</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178074">SUSE bug 1178074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180830">SUSE bug 1180830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605876" comment="apache2-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605877" comment="apache2-devel-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605878" comment="apache2-doc-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605879" comment="apache2-event-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605880" comment="apache2-example-pages-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605881" comment="apache2-prefork-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605882" comment="apache2-utils-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605883" comment="apache2-worker-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11996</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11996" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11996" ref_url="https://www.suse.com/security/cve/CVE-2020-11996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007165.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html" source="SUSE-SU"/>
    <description>
    A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11996/">CVE-2020-11996</cve>
	<bugzilla href="https://bugzilla.suse.com/1173389">SUSE bug 1173389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604378" comment="tomcat-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604379" comment="tomcat-admin-webapps-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604380" comment="tomcat-docs-webapp-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604381" comment="tomcat-el-3_0-api-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604382" comment="tomcat-embed-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604383" comment="tomcat-javadoc-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604384" comment="tomcat-jsp-2_3-api-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604385" comment="tomcat-jsvc-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604386" comment="tomcat-lib-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604387" comment="tomcat-servlet-4_0-api-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604388" comment="tomcat-webapps-9.0.36-lp151.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12050</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12050" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12050" ref_url="https://www.suse.com/security/cve/CVE-2020-12050" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0612-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00026.html" source="SUSE-SU"/>
    <description>
    SQLiteODBC 0.9996, as packaged for certain Linux distributions as 0.9996-4, has a race condition leading to root privilege escalation because any user can replace a /tmp/sqliteodbc$$ file with new contents that cause loading of an arbitrary library.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12050/">CVE-2020-12050</cve>
	<bugzilla href="https://bugzilla.suse.com/1171041">SUSE bug 1171041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607864" comment="sqliteodbc-0.9996-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009282973" comment="sqliteodbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607865" comment="sqliteodbc-doc-0.9996-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009282974" comment="sqliteodbc-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12066</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12066" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12066" ref_url="https://www.suse.com/security/cve/CVE-2020-12066" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00045.html" source="SUSE-SU"/>
    <description>
    CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12066/">CVE-2020-12066</cve>
	<bugzilla href="https://bugzilla.suse.com/1170252">SUSE bug 1170252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607647" comment="teeworlds-0.7.5-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266800" comment="teeworlds is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12100</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12100" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12100" ref_url="https://www.suse.com/security/cve/CVE-2020-12100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLBPVUTTVOKCDH7OSMVSVIQEI7TKHOMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0072-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUR6FYAW4F7DJJAFNZ7FNLNEQNDU6ZEZ/" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12100/">CVE-2020-12100</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180406">SUSE bug 1180406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609505" comment="dovecot23-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609506" comment="dovecot23-backend-mysql-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609507" comment="dovecot23-backend-pgsql-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609508" comment="dovecot23-backend-sqlite-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609509" comment="dovecot23-devel-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609510" comment="dovecot23-fts-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609511" comment="dovecot23-fts-lucene-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609512" comment="dovecot23-fts-solr-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609513" comment="dovecot23-fts-squat-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12105</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12105" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12105" ref_url="https://www.suse.com/security/cve/CVE-2020-12105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006836.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00039.html" source="SUSE-SU"/>
    <description>
    OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12105/">CVE-2020-12105</cve>
	<bugzilla href="https://bugzilla.suse.com/1170452">SUSE bug 1170452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608058" comment="openconnect-7.08-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151736" comment="openconnect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608059" comment="openconnect-devel-7.08-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151737" comment="openconnect-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608060" comment="openconnect-doc-7.08-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268921" comment="openconnect-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608061" comment="openconnect-lang-7.08-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177178" comment="openconnect-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12108</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12108" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html" source="SUSE-SU"/>
    <description>
    /options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108</cve>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607972" comment="mailman-2.1.29-lp151.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151563" comment="mailman is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12114</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114</cve>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12243</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html" source="SUSE-SU"/>
    <description>
    In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607948" comment="libldap-2_4-2-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607949" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607950" comment="libldap-data-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607951" comment="openldap2-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607952" comment="openldap2-back-meta-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607953" comment="openldap2-back-perl-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607954" comment="openldap2-back-sock-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607955" comment="openldap2-back-sql-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607956" comment="openldap2-client-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607957" comment="openldap2-contrib-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607958" comment="openldap2-devel-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607959" comment="openldap2-devel-32bit-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607960" comment="openldap2-devel-static-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607961" comment="openldap2-doc-2.4.46-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607962" comment="openldap2-ppolicy-check-password-1.2-lp151.10.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12244</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12244" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12244" ref_url="https://www.suse.com/security/cve/CVE-2020-12244" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" source="SUSE-SU"/>
    <description>
    An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12244/">CVE-2020-12244</cve>
	<bugzilla href="https://bugzilla.suse.com/1171553">SUSE bug 1171553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609825" comment="pdns-recursor-4.1.12-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153799" comment="pdns-recursor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12268</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12268" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006802.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0653-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00034.html" source="SUSE-SU"/>
    <description>
    jbig2_image_compose in jbig2_image.c in Artifex jbig2dec before 0.18 has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268</cve>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607965" comment="ghostscript-9.52-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607966" comment="ghostscript-devel-9.52-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607967" comment="ghostscript-mini-9.52-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607968" comment="ghostscript-mini-devel-9.52-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607969" comment="ghostscript-x11-9.52-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607970" comment="libspectre-devel-0.2.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236536" comment="libspectre-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607971" comment="libspectre1-0.2.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236537" comment="libspectre1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12321</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12321" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1960-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNZ3NYJWZSI2ISRG5U4RX3XMDBRHDRTX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWOUPKVHO4A2R27BZDEYM2EMS4RXKDM4/" source="SUSE-SU"/>
    <description>
    Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321</cve>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606178" comment="kernel-firmware-20200107-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167632" comment="kernel-firmware is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606179" comment="ucode-amd-20200107-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12351</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12351" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178397">SUSE bug 1178397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605559" comment="kernel-debug-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605560" comment="kernel-debug-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605561" comment="kernel-debug-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605562" comment="kernel-default-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605563" comment="kernel-default-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605564" comment="kernel-default-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605565" comment="kernel-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605566" comment="kernel-docs-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605567" comment="kernel-docs-html-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605568" comment="kernel-kvmsmall-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605571" comment="kernel-macros-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605572" comment="kernel-obs-build-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605573" comment="kernel-obs-qa-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605574" comment="kernel-source-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605575" comment="kernel-source-vanilla-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605576" comment="kernel-syms-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605577" comment="kernel-vanilla-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605578" comment="kernel-vanilla-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605579" comment="kernel-vanilla-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12352</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178398">SUSE bug 1178398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605559" comment="kernel-debug-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605560" comment="kernel-debug-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605561" comment="kernel-debug-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605562" comment="kernel-default-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605563" comment="kernel-default-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605564" comment="kernel-default-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605565" comment="kernel-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605566" comment="kernel-docs-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605567" comment="kernel-docs-html-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605568" comment="kernel-kvmsmall-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605571" comment="kernel-macros-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605572" comment="kernel-obs-build-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605573" comment="kernel-obs-qa-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605574" comment="kernel-source-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605575" comment="kernel-source-vanilla-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605576" comment="kernel-syms-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605577" comment="kernel-vanilla-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605578" comment="kernel-vanilla-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605579" comment="kernel-vanilla-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12387</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
    <description>
    A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607847" comment="MozillaFirefox-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607848" comment="MozillaFirefox-branding-upstream-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607849" comment="MozillaFirefox-buildsymbols-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607850" comment="MozillaFirefox-devel-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607851" comment="MozillaFirefox-translations-common-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607852" comment="MozillaFirefox-translations-other-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607933" comment="MozillaThunderbird-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607934" comment="MozillaThunderbird-translations-common-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607935" comment="MozillaThunderbird-translations-other-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12388</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12388" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
    <description>
    The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR &lt; 68.8 and Firefox &lt; 76.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607847" comment="MozillaFirefox-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607848" comment="MozillaFirefox-branding-upstream-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607849" comment="MozillaFirefox-buildsymbols-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607850" comment="MozillaFirefox-devel-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607851" comment="MozillaFirefox-translations-common-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607852" comment="MozillaFirefox-translations-other-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12389</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12389" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
    <description>
    The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR &lt; 68.8 and Firefox &lt; 76.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607847" comment="MozillaFirefox-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607848" comment="MozillaFirefox-branding-upstream-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607849" comment="MozillaFirefox-buildsymbols-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607850" comment="MozillaFirefox-devel-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607851" comment="MozillaFirefox-translations-common-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607852" comment="MozillaFirefox-translations-other-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12392</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
    <description>
    The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local files. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607847" comment="MozillaFirefox-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607848" comment="MozillaFirefox-branding-upstream-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607849" comment="MozillaFirefox-buildsymbols-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607850" comment="MozillaFirefox-devel-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607851" comment="MozillaFirefox-translations-common-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607852" comment="MozillaFirefox-translations-other-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607933" comment="MozillaThunderbird-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607934" comment="MozillaThunderbird-translations-common-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607935" comment="MozillaThunderbird-translations-other-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12393</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
    <description>
    The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607847" comment="MozillaFirefox-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607848" comment="MozillaFirefox-branding-upstream-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607849" comment="MozillaFirefox-buildsymbols-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607850" comment="MozillaFirefox-devel-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607851" comment="MozillaFirefox-translations-common-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607852" comment="MozillaFirefox-translations-other-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607933" comment="MozillaThunderbird-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607934" comment="MozillaThunderbird-translations-common-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607935" comment="MozillaThunderbird-translations-other-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12395</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607847" comment="MozillaFirefox-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607848" comment="MozillaFirefox-branding-upstream-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607849" comment="MozillaFirefox-buildsymbols-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607850" comment="MozillaFirefox-devel-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607851" comment="MozillaFirefox-translations-common-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607852" comment="MozillaFirefox-translations-other-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607933" comment="MozillaThunderbird-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607934" comment="MozillaThunderbird-translations-common-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607935" comment="MozillaThunderbird-translations-other-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12397</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12397" ref_url="https://www.suse.com/security/cve/CVE-2020-12397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
    <description>
    By encoding Unicode whitespace characters within the From email header, an attacker can spoof the sender email address that Thunderbird displays. This vulnerability affects Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12397/">CVE-2020-12397</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607933" comment="MozillaThunderbird-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607934" comment="MozillaThunderbird-translations-common-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607935" comment="MozillaThunderbird-translations-other-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12398</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12398" ref_url="https://www.suse.com/security/cve/CVE-2020-12398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00019.html" source="SUSE-SU"/>
    <description>
    If Thunderbird is configured to use STARTTLS for an IMAP server, and the server sends a PREAUTH response, then Thunderbird will continue with an unencrypted connection, causing email data to be sent without protection. This vulnerability affects Thunderbird &lt; 68.9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12398/">CVE-2020-12398</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608462" comment="MozillaThunderbird-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608463" comment="MozillaThunderbird-translations-common-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608464" comment="MozillaThunderbird-translations-other-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12399</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00047.html" source="SUSE-SU"/>
    <description>
    NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609017" comment="libfreebl3-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609018" comment="libfreebl3-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609019" comment="libfreebl3-hmac-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609020" comment="libfreebl3-hmac-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609021" comment="libsoftokn3-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609022" comment="libsoftokn3-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609023" comment="libsoftokn3-hmac-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609024" comment="libsoftokn3-hmac-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609025" comment="mozilla-nspr-4.25-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609026" comment="mozilla-nspr-32bit-4.25-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609027" comment="mozilla-nspr-devel-4.25-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609028" comment="mozilla-nss-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609029" comment="mozilla-nss-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609030" comment="mozilla-nss-certs-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609031" comment="mozilla-nss-certs-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609032" comment="mozilla-nss-devel-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609033" comment="mozilla-nss-sysinit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609034" comment="mozilla-nss-sysinit-32bit-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609035" comment="mozilla-nss-tools-3.53-lp151.2.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12402</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0953-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609191" comment="libfreebl3-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609192" comment="libfreebl3-32bit-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152810" comment="libfreebl3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609193" comment="libfreebl3-hmac-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244408" comment="libfreebl3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609194" comment="libfreebl3-hmac-32bit-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244409" comment="libfreebl3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609195" comment="libsoftokn3-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609196" comment="libsoftokn3-32bit-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152811" comment="libsoftokn3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609197" comment="libsoftokn3-hmac-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244410" comment="libsoftokn3-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609198" comment="libsoftokn3-hmac-32bit-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244411" comment="libsoftokn3-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609199" comment="mozilla-nss-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609200" comment="mozilla-nss-32bit-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152813" comment="mozilla-nss-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609201" comment="mozilla-nss-certs-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609202" comment="mozilla-nss-certs-32bit-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152814" comment="mozilla-nss-certs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609203" comment="mozilla-nss-devel-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151502" comment="mozilla-nss-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609204" comment="mozilla-nss-sysinit-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152815" comment="mozilla-nss-sysinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609205" comment="mozilla-nss-sysinit-32bit-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152816" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609206" comment="mozilla-nss-tools-3.53.1-lp151.2.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12405</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00019.html" source="SUSE-SU"/>
    <description>
    When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608426" comment="MozillaFirefox-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608427" comment="MozillaFirefox-branding-upstream-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608428" comment="MozillaFirefox-buildsymbols-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608429" comment="MozillaFirefox-devel-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608430" comment="MozillaFirefox-translations-common-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608431" comment="MozillaFirefox-translations-other-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608462" comment="MozillaThunderbird-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608463" comment="MozillaThunderbird-translations-common-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608464" comment="MozillaThunderbird-translations-other-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12406</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla Developer Iain Ireland discovered a missing type check during unboxed objects removal, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608426" comment="MozillaFirefox-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608427" comment="MozillaFirefox-branding-upstream-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608428" comment="MozillaFirefox-buildsymbols-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608429" comment="MozillaFirefox-devel-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608430" comment="MozillaFirefox-translations-common-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608431" comment="MozillaFirefox-translations-other-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608462" comment="MozillaThunderbird-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608463" comment="MozillaThunderbird-translations-common-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608464" comment="MozillaThunderbird-translations-other-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12410</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608426" comment="MozillaFirefox-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608427" comment="MozillaFirefox-branding-upstream-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608428" comment="MozillaFirefox-buildsymbols-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608429" comment="MozillaFirefox-devel-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608430" comment="MozillaFirefox-translations-common-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608431" comment="MozillaFirefox-translations-other-68.9.0-lp151.2.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608462" comment="MozillaThunderbird-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608463" comment="MozillaThunderbird-translations-common-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608464" comment="MozillaThunderbird-translations-other-68.9.0-lp151.2.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12415</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12415" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When "%2F" was present in a manifest URL, Firefox's AppCache behavior may have become confused and allowed a manifest to be served from a subdirectory. This could cause the appcache to be used to service requests for the top level directory. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12416</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12416" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    A VideoStreamEncoder may have been freed in a race condition with VideoBroadcaster::AddOrUpdateSink, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12417</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. *Note: this issue only affects Firefox on ARM64 platforms.* This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609240" comment="MozillaThunderbird-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609241" comment="MozillaThunderbird-translations-common-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609242" comment="MozillaThunderbird-translations-other-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12418</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609240" comment="MozillaThunderbird-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609241" comment="MozillaThunderbird-translations-common-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609242" comment="MozillaThunderbird-translations-other-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12419</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609240" comment="MozillaThunderbird-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609241" comment="MozillaThunderbird-translations-common-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609242" comment="MozillaThunderbird-translations-other-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12420</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609240" comment="MozillaThunderbird-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609241" comment="MozillaThunderbird-translations-common-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609242" comment="MozillaThunderbird-translations-other-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12421</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609240" comment="MozillaThunderbird-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609241" comment="MozillaThunderbird-translations-common-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609242" comment="MozillaThunderbird-translations-other-68.10.0-lp151.2.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12422</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12423</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12423" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution. *Note: This issue only affects the Windows operating system; other operating systems are unaffected.* This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12424</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12424" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12425</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12425" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Due to confusion processing a hyphen character in Date.parse(), a one-byte out of bounds read could have occurred, leading to potential information disclosure. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12426</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12426" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 77. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604355" comment="MozillaFirefox-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604356" comment="MozillaFirefox-branding-upstream-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604357" comment="MozillaFirefox-buildsymbols-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604358" comment="MozillaFirefox-devel-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604359" comment="MozillaFirefox-translations-common-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604360" comment="MozillaFirefox-translations-other-78.0.1-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12464</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464</cve>
	<bugzilla href="https://bugzilla.suse.com/1170901">SUSE bug 1170901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12625" ref_url="https://www.suse.com/security/cve/CVE-2020-12625" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12625/">CVE-2020-12625</cve>
	<bugzilla href="https://bugzilla.suse.com/1171040">SUSE bug 1171040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609735" comment="roundcubemail-1.3.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12640</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12640" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12640" ref_url="https://www.suse.com/security/cve/CVE-2020-12640" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12640/">CVE-2020-12640</cve>
	<bugzilla href="https://bugzilla.suse.com/1171149">SUSE bug 1171149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609735" comment="roundcubemail-1.3.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12641</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12641" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12641" ref_url="https://www.suse.com/security/cve/CVE-2020-12641" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12641/">CVE-2020-12641</cve>
	<bugzilla href="https://bugzilla.suse.com/1171148">SUSE bug 1171148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609735" comment="roundcubemail-1.3.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12652</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12653</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12655</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655</cve>
	<bugzilla href="https://bugzilla.suse.com/1171217">SUSE bug 1171217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12656</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12657</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12657" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657</cve>
	<bugzilla href="https://bugzilla.suse.com/1171205">SUSE bug 1171205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659</cve>
	<bugzilla href="https://bugzilla.suse.com/1171214">SUSE bug 1171214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12662</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12662" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12662" ref_url="https://www.suse.com/security/cve/CVE-2020-12662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html" source="SUSE-SU"/>
    <description>
    Unbound before 1.10.1 has Insufficient Control of Network Message Volume, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12662/">CVE-2020-12662</cve>
	<bugzilla href="https://bugzilla.suse.com/1171889">SUSE bug 1171889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609138" comment="libunbound-devel-mini-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286672" comment="libunbound-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609139" comment="libunbound2-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177204" comment="libunbound2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609140" comment="unbound-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286673" comment="unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609141" comment="unbound-anchor-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177205" comment="unbound-anchor is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609142" comment="unbound-devel-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286674" comment="unbound-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609143" comment="unbound-munin-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286675" comment="unbound-munin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609144" comment="unbound-python-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286676" comment="unbound-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12663</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12663" ref_url="https://www.suse.com/security/cve/CVE-2020-12663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html" source="SUSE-SU"/>
    <description>
    Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12663/">CVE-2020-12663</cve>
	<bugzilla href="https://bugzilla.suse.com/1171889">SUSE bug 1171889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609138" comment="libunbound-devel-mini-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286672" comment="libunbound-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609139" comment="libunbound2-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177204" comment="libunbound2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609140" comment="unbound-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286673" comment="unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609141" comment="unbound-anchor-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177205" comment="unbound-anchor is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609142" comment="unbound-devel-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286674" comment="unbound-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609143" comment="unbound-munin-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286675" comment="unbound-munin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609144" comment="unbound-python-1.6.8-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286676" comment="unbound-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12672</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12672" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12672" ref_url="https://www.suse.com/security/cve/CVE-2020-12672" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00012.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick through 1.3.35 has a heap-based buffer overflow in ReadMNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12672/">CVE-2020-12672</cve>
	<bugzilla href="https://bugzilla.suse.com/1171271">SUSE bug 1171271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608256" comment="GraphicsMagick-1.3.29-lp151.4.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608257" comment="GraphicsMagick-devel-1.3.29-lp151.4.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608258" comment="libGraphicsMagick++-Q16-12-1.3.29-lp151.4.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608259" comment="libGraphicsMagick++-devel-1.3.29-lp151.4.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608260" comment="libGraphicsMagick-Q16-3-1.3.29-lp151.4.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608261" comment="libGraphicsMagick3-config-1.3.29-lp151.4.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608262" comment="libGraphicsMagickWand-Q16-2-1.3.29-lp151.4.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608263" comment="perl-GraphicsMagick-1.3.29-lp151.4.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00059.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604919" comment="dovecot23-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604920" comment="dovecot23-backend-mysql-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604921" comment="dovecot23-backend-pgsql-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604922" comment="dovecot23-backend-sqlite-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604923" comment="dovecot23-devel-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604924" comment="dovecot23-fts-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604925" comment="dovecot23-fts-lucene-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604926" comment="dovecot23-fts-solr-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604927" comment="dovecot23-fts-squat-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00059.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604919" comment="dovecot23-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604920" comment="dovecot23-backend-mysql-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604921" comment="dovecot23-backend-pgsql-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604922" comment="dovecot23-backend-sqlite-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604923" comment="dovecot23-devel-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604924" comment="dovecot23-fts-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604925" comment="dovecot23-fts-lucene-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604926" comment="dovecot23-fts-solr-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604927" comment="dovecot23-fts-squat-2.3.10-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12693</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12693" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12693" ref_url="https://www.suse.com/security/cve/CVE-2020-12693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1468-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00179.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1969-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUZCI5YDK7I74E6E3IP5YWR5GMSO4LPV/" source="SUSE-SU"/>
    <description>
    Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-12693/">CVE-2020-12693</cve>
	<bugzilla href="https://bugzilla.suse.com/1172004">SUSE bug 1172004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173804">SUSE bug 1173804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605226" comment="libpmi0-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605227" comment="libslurm33-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266850" comment="libslurm33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605228" comment="perl-slurm-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605229" comment="slurm-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605230" comment="slurm-auth-none-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605231" comment="slurm-config-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605232" comment="slurm-config-man-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605233" comment="slurm-cray-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605234" comment="slurm-devel-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605235" comment="slurm-doc-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605236" comment="slurm-hdf5-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605237" comment="slurm-lua-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605238" comment="slurm-munge-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605239" comment="slurm-node-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605240" comment="slurm-openlava-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605241" comment="slurm-pam_slurm-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605242" comment="slurm-plugins-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605243" comment="slurm-seff-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605244" comment="slurm-sjstat-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605245" comment="slurm-slurmdbd-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605246" comment="slurm-sql-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605247" comment="slurm-sview-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605248" comment="slurm-torque-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605249" comment="slurm-webdoc-18.08.9-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12695" ref_url="https://www.suse.com/security/cve/CVE-2020-12695" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2GHF3UJM6D2JSKELXMJY57IRWK3PJM3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSSIKL5YFHBGYOJ3SQBDZNPPVD4OU4WF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNZKSW2K4W6JRPVMJ5SOHHDWS6UI5LAZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7S45AUDAZDSITTGVELYZ3FY6T7HMLOED/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0545-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GHTARPJSUMITH7M3ESWRIZUIYW5UAM6/" source="SUSE-SU"/>
    <description>
    The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12695/">CVE-2020-12695</cve>
	<bugzilla href="https://bugzilla.suse.com/1172700">SUSE bug 1172700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179447">SUSE bug 1179447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606722" comment="minidlna-1.3.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009334739" comment="minidlna is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12723</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" source="SUSE-SU"/>
    <description>
    regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609004" comment="perl-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609005" comment="perl-32bit-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151456" comment="perl-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609006" comment="perl-base-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609007" comment="perl-base-32bit-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153231" comment="perl-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609008" comment="perl-doc-5.26.1-lp151.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151458" comment="perl-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767</cve>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608454" comment="libexif-devel-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608455" comment="libexif-devel-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279253" comment="libexif-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608456" comment="libexif12-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608457" comment="libexif12-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12801</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12801" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12801" ref_url="https://www.suse.com/security/cve/CVE-2020-12801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00011.html" source="SUSE-SU"/>
    <description>
    If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted. This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted. This issue affects: LibreOffice 6-3 series versions prior to 6.3.6; 6-4 series versions prior to 6.4.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12801/">CVE-2020-12801</cve>
	<bugzilla href="https://bugzilla.suse.com/1171997">SUSE bug 1171997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608283" comment="libreoffice-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608284" comment="libreoffice-base-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608285" comment="libreoffice-base-drivers-firebird-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608286" comment="libreoffice-base-drivers-postgresql-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608287" comment="libreoffice-branding-upstream-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608288" comment="libreoffice-calc-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608289" comment="libreoffice-calc-extensions-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608290" comment="libreoffice-draw-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608291" comment="libreoffice-filters-optional-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608292" comment="libreoffice-gdb-pretty-printers-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608293" comment="libreoffice-glade-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608294" comment="libreoffice-gnome-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608295" comment="libreoffice-gtk3-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608296" comment="libreoffice-icon-themes-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608297" comment="libreoffice-impress-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608298" comment="libreoffice-l10n-af-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608299" comment="libreoffice-l10n-am-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608300" comment="libreoffice-l10n-ar-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608301" comment="libreoffice-l10n-as-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608302" comment="libreoffice-l10n-ast-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608303" comment="libreoffice-l10n-be-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608304" comment="libreoffice-l10n-bg-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608305" comment="libreoffice-l10n-bn-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608306" comment="libreoffice-l10n-bn_IN-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608307" comment="libreoffice-l10n-bo-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608308" comment="libreoffice-l10n-br-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608309" comment="libreoffice-l10n-brx-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608310" comment="libreoffice-l10n-bs-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608311" comment="libreoffice-l10n-ca-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608312" comment="libreoffice-l10n-ca_valencia-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608313" comment="libreoffice-l10n-cs-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608314" comment="libreoffice-l10n-cy-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608315" comment="libreoffice-l10n-da-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608316" comment="libreoffice-l10n-de-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608317" comment="libreoffice-l10n-dgo-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608318" comment="libreoffice-l10n-dsb-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608319" comment="libreoffice-l10n-dz-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608320" comment="libreoffice-l10n-el-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608321" comment="libreoffice-l10n-en-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608322" comment="libreoffice-l10n-en_GB-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608323" comment="libreoffice-l10n-en_ZA-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608324" comment="libreoffice-l10n-eo-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608325" comment="libreoffice-l10n-es-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608326" comment="libreoffice-l10n-et-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608327" comment="libreoffice-l10n-eu-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608328" comment="libreoffice-l10n-fa-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608329" comment="libreoffice-l10n-fi-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608330" comment="libreoffice-l10n-fr-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608331" comment="libreoffice-l10n-fy-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608332" comment="libreoffice-l10n-ga-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608333" comment="libreoffice-l10n-gd-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608334" comment="libreoffice-l10n-gl-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608335" comment="libreoffice-l10n-gu-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608336" comment="libreoffice-l10n-gug-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608337" comment="libreoffice-l10n-he-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608338" comment="libreoffice-l10n-hi-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608339" comment="libreoffice-l10n-hr-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608340" comment="libreoffice-l10n-hsb-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608341" comment="libreoffice-l10n-hu-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608342" comment="libreoffice-l10n-id-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608343" comment="libreoffice-l10n-is-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608344" comment="libreoffice-l10n-it-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608345" comment="libreoffice-l10n-ja-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608346" comment="libreoffice-l10n-ka-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608347" comment="libreoffice-l10n-kab-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608348" comment="libreoffice-l10n-kk-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608349" comment="libreoffice-l10n-km-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608350" comment="libreoffice-l10n-kmr_Latn-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608351" comment="libreoffice-l10n-kn-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608352" comment="libreoffice-l10n-ko-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608353" comment="libreoffice-l10n-kok-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608354" comment="libreoffice-l10n-ks-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608355" comment="libreoffice-l10n-lb-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608356" comment="libreoffice-l10n-lo-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608357" comment="libreoffice-l10n-lt-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608358" comment="libreoffice-l10n-lv-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608359" comment="libreoffice-l10n-mai-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608360" comment="libreoffice-l10n-mk-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608361" comment="libreoffice-l10n-ml-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608362" comment="libreoffice-l10n-mn-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608363" comment="libreoffice-l10n-mni-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608364" comment="libreoffice-l10n-mr-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608365" comment="libreoffice-l10n-my-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608366" comment="libreoffice-l10n-nb-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608367" comment="libreoffice-l10n-ne-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608368" comment="libreoffice-l10n-nl-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608369" comment="libreoffice-l10n-nn-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608370" comment="libreoffice-l10n-nr-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608371" comment="libreoffice-l10n-nso-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608372" comment="libreoffice-l10n-oc-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608373" comment="libreoffice-l10n-om-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608374" comment="libreoffice-l10n-or-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608375" comment="libreoffice-l10n-pa-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608376" comment="libreoffice-l10n-pl-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608377" comment="libreoffice-l10n-pt_BR-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608378" comment="libreoffice-l10n-pt_PT-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608379" comment="libreoffice-l10n-ro-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608380" comment="libreoffice-l10n-ru-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608381" comment="libreoffice-l10n-rw-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608382" comment="libreoffice-l10n-sa_IN-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608383" comment="libreoffice-l10n-sat-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608384" comment="libreoffice-l10n-sd-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608385" comment="libreoffice-l10n-si-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608386" comment="libreoffice-l10n-sid-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608387" comment="libreoffice-l10n-sk-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608388" comment="libreoffice-l10n-sl-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608389" comment="libreoffice-l10n-sq-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608390" comment="libreoffice-l10n-sr-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608391" comment="libreoffice-l10n-ss-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608392" comment="libreoffice-l10n-st-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608393" comment="libreoffice-l10n-sv-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608394" comment="libreoffice-l10n-sw_TZ-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608395" comment="libreoffice-l10n-szl-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275306" comment="libreoffice-l10n-szl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608396" comment="libreoffice-l10n-ta-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608397" comment="libreoffice-l10n-te-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608398" comment="libreoffice-l10n-tg-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608399" comment="libreoffice-l10n-th-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608400" comment="libreoffice-l10n-tn-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608401" comment="libreoffice-l10n-tr-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608402" comment="libreoffice-l10n-ts-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608403" comment="libreoffice-l10n-tt-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608404" comment="libreoffice-l10n-ug-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608405" comment="libreoffice-l10n-uk-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608406" comment="libreoffice-l10n-uz-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608407" comment="libreoffice-l10n-ve-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608408" comment="libreoffice-l10n-vec-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608409" comment="libreoffice-l10n-vi-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608410" comment="libreoffice-l10n-xh-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608411" comment="libreoffice-l10n-zh_CN-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608412" comment="libreoffice-l10n-zh_TW-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608413" comment="libreoffice-l10n-zu-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608414" comment="libreoffice-librelogo-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275307" comment="libreoffice-librelogo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608415" comment="libreoffice-mailmerge-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608416" comment="libreoffice-math-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608417" comment="libreoffice-officebean-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608418" comment="libreoffice-pyuno-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608419" comment="libreoffice-qt5-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608420" comment="libreoffice-sdk-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608421" comment="libreoffice-sdk-doc-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608422" comment="libreoffice-writer-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608423" comment="libreoffice-writer-extensions-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608424" comment="libreofficekit-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608425" comment="libreofficekit-devel-6.4.4.2-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12802" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12802" ref_url="https://www.suse.com/security/cve/CVE-2020-12802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html" source="SUSE-SU"/>
    <description>
    LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where remote graphic links loaded from docx documents were omitted from this protection prior to version 6.4.4. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12802/">CVE-2020-12802</cve>
	<bugzilla href="https://bugzilla.suse.com/1172796">SUSE bug 1172796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604717" comment="libreoffice-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604718" comment="libreoffice-base-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604719" comment="libreoffice-base-drivers-firebird-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604720" comment="libreoffice-base-drivers-postgresql-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604721" comment="libreoffice-branding-upstream-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604722" comment="libreoffice-calc-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604723" comment="libreoffice-calc-extensions-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604724" comment="libreoffice-draw-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604725" comment="libreoffice-filters-optional-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604726" comment="libreoffice-gdb-pretty-printers-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604727" comment="libreoffice-glade-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604728" comment="libreoffice-gnome-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604729" comment="libreoffice-gtk3-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604730" comment="libreoffice-icon-themes-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604731" comment="libreoffice-impress-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604732" comment="libreoffice-l10n-af-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604733" comment="libreoffice-l10n-am-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604734" comment="libreoffice-l10n-ar-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604735" comment="libreoffice-l10n-as-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604736" comment="libreoffice-l10n-ast-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604737" comment="libreoffice-l10n-be-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604738" comment="libreoffice-l10n-bg-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604739" comment="libreoffice-l10n-bn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604740" comment="libreoffice-l10n-bn_IN-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604741" comment="libreoffice-l10n-bo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604742" comment="libreoffice-l10n-br-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604743" comment="libreoffice-l10n-brx-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604744" comment="libreoffice-l10n-bs-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604745" comment="libreoffice-l10n-ca-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604746" comment="libreoffice-l10n-ca_valencia-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604747" comment="libreoffice-l10n-cs-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604748" comment="libreoffice-l10n-cy-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604749" comment="libreoffice-l10n-da-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604750" comment="libreoffice-l10n-de-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604751" comment="libreoffice-l10n-dgo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604752" comment="libreoffice-l10n-dsb-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604753" comment="libreoffice-l10n-dz-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604754" comment="libreoffice-l10n-el-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604755" comment="libreoffice-l10n-en-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604756" comment="libreoffice-l10n-en_GB-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604757" comment="libreoffice-l10n-en_ZA-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604758" comment="libreoffice-l10n-eo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604759" comment="libreoffice-l10n-es-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604760" comment="libreoffice-l10n-et-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604761" comment="libreoffice-l10n-eu-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604762" comment="libreoffice-l10n-fa-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604763" comment="libreoffice-l10n-fi-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604764" comment="libreoffice-l10n-fr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604765" comment="libreoffice-l10n-fy-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604766" comment="libreoffice-l10n-ga-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604767" comment="libreoffice-l10n-gd-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604768" comment="libreoffice-l10n-gl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604769" comment="libreoffice-l10n-gu-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604770" comment="libreoffice-l10n-gug-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604771" comment="libreoffice-l10n-he-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604772" comment="libreoffice-l10n-hi-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604773" comment="libreoffice-l10n-hr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604774" comment="libreoffice-l10n-hsb-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604775" comment="libreoffice-l10n-hu-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604776" comment="libreoffice-l10n-id-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604777" comment="libreoffice-l10n-is-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604778" comment="libreoffice-l10n-it-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604779" comment="libreoffice-l10n-ja-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604780" comment="libreoffice-l10n-ka-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604781" comment="libreoffice-l10n-kab-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604782" comment="libreoffice-l10n-kk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604783" comment="libreoffice-l10n-km-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604784" comment="libreoffice-l10n-kmr_Latn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604785" comment="libreoffice-l10n-kn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604786" comment="libreoffice-l10n-ko-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604787" comment="libreoffice-l10n-kok-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604788" comment="libreoffice-l10n-ks-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604789" comment="libreoffice-l10n-lb-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604790" comment="libreoffice-l10n-lo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604791" comment="libreoffice-l10n-lt-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604792" comment="libreoffice-l10n-lv-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604793" comment="libreoffice-l10n-mai-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604794" comment="libreoffice-l10n-mk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604795" comment="libreoffice-l10n-ml-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604796" comment="libreoffice-l10n-mn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604797" comment="libreoffice-l10n-mni-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604798" comment="libreoffice-l10n-mr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604799" comment="libreoffice-l10n-my-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604800" comment="libreoffice-l10n-nb-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604801" comment="libreoffice-l10n-ne-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604802" comment="libreoffice-l10n-nl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604803" comment="libreoffice-l10n-nn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604804" comment="libreoffice-l10n-nr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604805" comment="libreoffice-l10n-nso-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604806" comment="libreoffice-l10n-oc-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604807" comment="libreoffice-l10n-om-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604808" comment="libreoffice-l10n-or-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604809" comment="libreoffice-l10n-pa-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604810" comment="libreoffice-l10n-pl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604811" comment="libreoffice-l10n-pt_BR-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604812" comment="libreoffice-l10n-pt_PT-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604813" comment="libreoffice-l10n-ro-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604814" comment="libreoffice-l10n-ru-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604815" comment="libreoffice-l10n-rw-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604816" comment="libreoffice-l10n-sa_IN-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604817" comment="libreoffice-l10n-sat-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604818" comment="libreoffice-l10n-sd-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604819" comment="libreoffice-l10n-si-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604820" comment="libreoffice-l10n-sid-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604821" comment="libreoffice-l10n-sk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604822" comment="libreoffice-l10n-sl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604823" comment="libreoffice-l10n-sq-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604824" comment="libreoffice-l10n-sr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604825" comment="libreoffice-l10n-ss-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604826" comment="libreoffice-l10n-st-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604827" comment="libreoffice-l10n-sv-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604828" comment="libreoffice-l10n-sw_TZ-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604829" comment="libreoffice-l10n-szl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275306" comment="libreoffice-l10n-szl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604830" comment="libreoffice-l10n-ta-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604831" comment="libreoffice-l10n-te-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604832" comment="libreoffice-l10n-tg-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604833" comment="libreoffice-l10n-th-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604834" comment="libreoffice-l10n-tn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604835" comment="libreoffice-l10n-tr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604836" comment="libreoffice-l10n-ts-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604837" comment="libreoffice-l10n-tt-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604838" comment="libreoffice-l10n-ug-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604839" comment="libreoffice-l10n-uk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604840" comment="libreoffice-l10n-uz-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604841" comment="libreoffice-l10n-ve-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604842" comment="libreoffice-l10n-vec-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604843" comment="libreoffice-l10n-vi-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604844" comment="libreoffice-l10n-xh-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604845" comment="libreoffice-l10n-zh_CN-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604846" comment="libreoffice-l10n-zh_TW-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604847" comment="libreoffice-l10n-zu-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604848" comment="libreoffice-librelogo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275307" comment="libreoffice-librelogo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604849" comment="libreoffice-mailmerge-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604850" comment="libreoffice-math-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604851" comment="libreoffice-officebean-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604852" comment="libreoffice-pyuno-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604853" comment="libreoffice-qt5-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604854" comment="libreoffice-sdk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604855" comment="libreoffice-sdk-doc-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604856" comment="libreoffice-writer-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604857" comment="libreoffice-writer-extensions-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604858" comment="libreofficekit-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604859" comment="libreofficekit-devel-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12803" ref_url="https://www.suse.com/security/cve/CVE-2020-12803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00058.html" source="SUSE-SU"/>
    <description>
    ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12803/">CVE-2020-12803</cve>
	<bugzilla href="https://bugzilla.suse.com/1172795">SUSE bug 1172795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604717" comment="libreoffice-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151462" comment="libreoffice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604718" comment="libreoffice-base-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151463" comment="libreoffice-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604719" comment="libreoffice-base-drivers-firebird-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233578" comment="libreoffice-base-drivers-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604720" comment="libreoffice-base-drivers-postgresql-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153330" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604721" comment="libreoffice-branding-upstream-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151465" comment="libreoffice-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604722" comment="libreoffice-calc-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151466" comment="libreoffice-calc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604723" comment="libreoffice-calc-extensions-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151467" comment="libreoffice-calc-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604724" comment="libreoffice-draw-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151468" comment="libreoffice-draw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604725" comment="libreoffice-filters-optional-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151469" comment="libreoffice-filters-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604726" comment="libreoffice-gdb-pretty-printers-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153331" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604727" comment="libreoffice-glade-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153332" comment="libreoffice-glade is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604728" comment="libreoffice-gnome-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151470" comment="libreoffice-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604729" comment="libreoffice-gtk3-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153333" comment="libreoffice-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604730" comment="libreoffice-icon-themes-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009176160" comment="libreoffice-icon-themes is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604731" comment="libreoffice-impress-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151477" comment="libreoffice-impress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604732" comment="libreoffice-l10n-af-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153334" comment="libreoffice-l10n-af is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604733" comment="libreoffice-l10n-am-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239716" comment="libreoffice-l10n-am is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604734" comment="libreoffice-l10n-ar-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153335" comment="libreoffice-l10n-ar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604735" comment="libreoffice-l10n-as-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153336" comment="libreoffice-l10n-as is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604736" comment="libreoffice-l10n-ast-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239717" comment="libreoffice-l10n-ast is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604737" comment="libreoffice-l10n-be-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239718" comment="libreoffice-l10n-be is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604738" comment="libreoffice-l10n-bg-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153337" comment="libreoffice-l10n-bg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604739" comment="libreoffice-l10n-bn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153338" comment="libreoffice-l10n-bn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604740" comment="libreoffice-l10n-bn_IN-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239719" comment="libreoffice-l10n-bn_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604741" comment="libreoffice-l10n-bo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239720" comment="libreoffice-l10n-bo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604742" comment="libreoffice-l10n-br-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153339" comment="libreoffice-l10n-br is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604743" comment="libreoffice-l10n-brx-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239721" comment="libreoffice-l10n-brx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604744" comment="libreoffice-l10n-bs-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239722" comment="libreoffice-l10n-bs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604745" comment="libreoffice-l10n-ca-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153340" comment="libreoffice-l10n-ca is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604746" comment="libreoffice-l10n-ca_valencia-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239723" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604747" comment="libreoffice-l10n-cs-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151479" comment="libreoffice-l10n-cs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604748" comment="libreoffice-l10n-cy-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153341" comment="libreoffice-l10n-cy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604749" comment="libreoffice-l10n-da-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151480" comment="libreoffice-l10n-da is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604750" comment="libreoffice-l10n-de-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151481" comment="libreoffice-l10n-de is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604751" comment="libreoffice-l10n-dgo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239724" comment="libreoffice-l10n-dgo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604752" comment="libreoffice-l10n-dsb-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009262204" comment="libreoffice-l10n-dsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604753" comment="libreoffice-l10n-dz-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153342" comment="libreoffice-l10n-dz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604754" comment="libreoffice-l10n-el-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151482" comment="libreoffice-l10n-el is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604755" comment="libreoffice-l10n-en-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151483" comment="libreoffice-l10n-en is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604756" comment="libreoffice-l10n-en_GB-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239725" comment="libreoffice-l10n-en_GB is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604757" comment="libreoffice-l10n-en_ZA-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239726" comment="libreoffice-l10n-en_ZA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604758" comment="libreoffice-l10n-eo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171437" comment="libreoffice-l10n-eo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604759" comment="libreoffice-l10n-es-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151484" comment="libreoffice-l10n-es is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604760" comment="libreoffice-l10n-et-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153343" comment="libreoffice-l10n-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604761" comment="libreoffice-l10n-eu-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153344" comment="libreoffice-l10n-eu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604762" comment="libreoffice-l10n-fa-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153345" comment="libreoffice-l10n-fa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604763" comment="libreoffice-l10n-fi-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153346" comment="libreoffice-l10n-fi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604764" comment="libreoffice-l10n-fr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151485" comment="libreoffice-l10n-fr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604765" comment="libreoffice-l10n-fy-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239727" comment="libreoffice-l10n-fy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604766" comment="libreoffice-l10n-ga-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153347" comment="libreoffice-l10n-ga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604767" comment="libreoffice-l10n-gd-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239728" comment="libreoffice-l10n-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604768" comment="libreoffice-l10n-gl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153348" comment="libreoffice-l10n-gl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604769" comment="libreoffice-l10n-gu-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153349" comment="libreoffice-l10n-gu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604770" comment="libreoffice-l10n-gug-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239729" comment="libreoffice-l10n-gug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604771" comment="libreoffice-l10n-he-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153350" comment="libreoffice-l10n-he is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604772" comment="libreoffice-l10n-hi-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153351" comment="libreoffice-l10n-hi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604773" comment="libreoffice-l10n-hr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153352" comment="libreoffice-l10n-hr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604774" comment="libreoffice-l10n-hsb-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239730" comment="libreoffice-l10n-hsb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604775" comment="libreoffice-l10n-hu-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151486" comment="libreoffice-l10n-hu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604776" comment="libreoffice-l10n-id-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239731" comment="libreoffice-l10n-id is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604777" comment="libreoffice-l10n-is-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239732" comment="libreoffice-l10n-is is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604778" comment="libreoffice-l10n-it-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151487" comment="libreoffice-l10n-it is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604779" comment="libreoffice-l10n-ja-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151488" comment="libreoffice-l10n-ja is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604780" comment="libreoffice-l10n-ka-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239733" comment="libreoffice-l10n-ka is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604781" comment="libreoffice-l10n-kab-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239734" comment="libreoffice-l10n-kab is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604782" comment="libreoffice-l10n-kk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153353" comment="libreoffice-l10n-kk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604783" comment="libreoffice-l10n-km-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239735" comment="libreoffice-l10n-km is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604784" comment="libreoffice-l10n-kmr_Latn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239736" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604785" comment="libreoffice-l10n-kn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153354" comment="libreoffice-l10n-kn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604786" comment="libreoffice-l10n-ko-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153355" comment="libreoffice-l10n-ko is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604787" comment="libreoffice-l10n-kok-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239737" comment="libreoffice-l10n-kok is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604788" comment="libreoffice-l10n-ks-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239738" comment="libreoffice-l10n-ks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604789" comment="libreoffice-l10n-lb-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239739" comment="libreoffice-l10n-lb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604790" comment="libreoffice-l10n-lo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239740" comment="libreoffice-l10n-lo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604791" comment="libreoffice-l10n-lt-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153356" comment="libreoffice-l10n-lt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604792" comment="libreoffice-l10n-lv-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153357" comment="libreoffice-l10n-lv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604793" comment="libreoffice-l10n-mai-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153358" comment="libreoffice-l10n-mai is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604794" comment="libreoffice-l10n-mk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239741" comment="libreoffice-l10n-mk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604795" comment="libreoffice-l10n-ml-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153359" comment="libreoffice-l10n-ml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604796" comment="libreoffice-l10n-mn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239742" comment="libreoffice-l10n-mn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604797" comment="libreoffice-l10n-mni-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239743" comment="libreoffice-l10n-mni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604798" comment="libreoffice-l10n-mr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153360" comment="libreoffice-l10n-mr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604799" comment="libreoffice-l10n-my-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239744" comment="libreoffice-l10n-my is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604800" comment="libreoffice-l10n-nb-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153361" comment="libreoffice-l10n-nb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604801" comment="libreoffice-l10n-ne-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239745" comment="libreoffice-l10n-ne is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604802" comment="libreoffice-l10n-nl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153362" comment="libreoffice-l10n-nl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604803" comment="libreoffice-l10n-nn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153363" comment="libreoffice-l10n-nn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604804" comment="libreoffice-l10n-nr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153364" comment="libreoffice-l10n-nr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604805" comment="libreoffice-l10n-nso-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153365" comment="libreoffice-l10n-nso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604806" comment="libreoffice-l10n-oc-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239746" comment="libreoffice-l10n-oc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604807" comment="libreoffice-l10n-om-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239747" comment="libreoffice-l10n-om is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604808" comment="libreoffice-l10n-or-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153366" comment="libreoffice-l10n-or is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604809" comment="libreoffice-l10n-pa-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153367" comment="libreoffice-l10n-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604810" comment="libreoffice-l10n-pl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151489" comment="libreoffice-l10n-pl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604811" comment="libreoffice-l10n-pt_BR-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158758" comment="libreoffice-l10n-pt_BR is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604812" comment="libreoffice-l10n-pt_PT-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158759" comment="libreoffice-l10n-pt_PT is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604813" comment="libreoffice-l10n-ro-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153370" comment="libreoffice-l10n-ro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604814" comment="libreoffice-l10n-ru-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151490" comment="libreoffice-l10n-ru is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604815" comment="libreoffice-l10n-rw-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239748" comment="libreoffice-l10n-rw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604816" comment="libreoffice-l10n-sa_IN-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239749" comment="libreoffice-l10n-sa_IN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604817" comment="libreoffice-l10n-sat-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239750" comment="libreoffice-l10n-sat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604818" comment="libreoffice-l10n-sd-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239751" comment="libreoffice-l10n-sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604819" comment="libreoffice-l10n-si-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153371" comment="libreoffice-l10n-si is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604820" comment="libreoffice-l10n-sid-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239752" comment="libreoffice-l10n-sid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604821" comment="libreoffice-l10n-sk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153372" comment="libreoffice-l10n-sk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604822" comment="libreoffice-l10n-sl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153373" comment="libreoffice-l10n-sl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604823" comment="libreoffice-l10n-sq-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239753" comment="libreoffice-l10n-sq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604824" comment="libreoffice-l10n-sr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153374" comment="libreoffice-l10n-sr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604825" comment="libreoffice-l10n-ss-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153375" comment="libreoffice-l10n-ss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604826" comment="libreoffice-l10n-st-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153376" comment="libreoffice-l10n-st is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604827" comment="libreoffice-l10n-sv-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153377" comment="libreoffice-l10n-sv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604828" comment="libreoffice-l10n-sw_TZ-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239754" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604829" comment="libreoffice-l10n-szl-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275306" comment="libreoffice-l10n-szl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604830" comment="libreoffice-l10n-ta-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153378" comment="libreoffice-l10n-ta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604831" comment="libreoffice-l10n-te-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153379" comment="libreoffice-l10n-te is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604832" comment="libreoffice-l10n-tg-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239755" comment="libreoffice-l10n-tg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604833" comment="libreoffice-l10n-th-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153380" comment="libreoffice-l10n-th is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604834" comment="libreoffice-l10n-tn-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153381" comment="libreoffice-l10n-tn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604835" comment="libreoffice-l10n-tr-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153382" comment="libreoffice-l10n-tr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604836" comment="libreoffice-l10n-ts-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153383" comment="libreoffice-l10n-ts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604837" comment="libreoffice-l10n-tt-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239756" comment="libreoffice-l10n-tt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604838" comment="libreoffice-l10n-ug-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239757" comment="libreoffice-l10n-ug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604839" comment="libreoffice-l10n-uk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153384" comment="libreoffice-l10n-uk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604840" comment="libreoffice-l10n-uz-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239758" comment="libreoffice-l10n-uz is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604841" comment="libreoffice-l10n-ve-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153385" comment="libreoffice-l10n-ve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604842" comment="libreoffice-l10n-vec-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239759" comment="libreoffice-l10n-vec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604843" comment="libreoffice-l10n-vi-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239760" comment="libreoffice-l10n-vi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604844" comment="libreoffice-l10n-xh-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153386" comment="libreoffice-l10n-xh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604845" comment="libreoffice-l10n-zh_CN-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158760" comment="libreoffice-l10n-zh_CN is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604846" comment="libreoffice-l10n-zh_TW-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158761" comment="libreoffice-l10n-zh_TW is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604847" comment="libreoffice-l10n-zu-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153389" comment="libreoffice-l10n-zu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604848" comment="libreoffice-librelogo-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275307" comment="libreoffice-librelogo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604849" comment="libreoffice-mailmerge-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151491" comment="libreoffice-mailmerge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604850" comment="libreoffice-math-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151492" comment="libreoffice-math is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604851" comment="libreoffice-officebean-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153390" comment="libreoffice-officebean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604852" comment="libreoffice-pyuno-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151493" comment="libreoffice-pyuno is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604853" comment="libreoffice-qt5-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239761" comment="libreoffice-qt5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604854" comment="libreoffice-sdk-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153391" comment="libreoffice-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604855" comment="libreoffice-sdk-doc-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153392" comment="libreoffice-sdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604856" comment="libreoffice-writer-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151494" comment="libreoffice-writer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604857" comment="libreoffice-writer-extensions-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151495" comment="libreoffice-writer-extensions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604858" comment="libreofficekit-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153393" comment="libreofficekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604859" comment="libreofficekit-devel-6.4.5.2-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153394" comment="libreofficekit-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12823</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12823" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12823" ref_url="https://www.suse.com/security/cve/CVE-2020-12823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html" source="SUSE-SU"/>
    <description>
    OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12823/">CVE-2020-12823</cve>
	<bugzilla href="https://bugzilla.suse.com/1171862">SUSE bug 1171862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609348" comment="openconnect-7.08-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151736" comment="openconnect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609349" comment="openconnect-devel-7.08-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151737" comment="openconnect-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609350" comment="openconnect-doc-7.08-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268921" comment="openconnect-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609351" comment="openconnect-lang-7.08-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177178" comment="openconnect-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12861</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12861" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-080.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605871" comment="sane-backends-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605872" comment="sane-backends-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605873" comment="sane-backends-autoconfig-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605874" comment="sane-backends-devel-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605875" comment="sane-backends-devel-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-082.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605871" comment="sane-backends-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605872" comment="sane-backends-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605873" comment="sane-backends-autoconfig-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605874" comment="sane-backends-devel-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605875" comment="sane-backends-devel-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605871" comment="sane-backends-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605872" comment="sane-backends-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605873" comment="sane-backends-autoconfig-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605874" comment="sane-backends-devel-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605875" comment="sane-backends-devel-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12864</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12864" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-081.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605871" comment="sane-backends-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605872" comment="sane-backends-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605873" comment="sane-backends-autoconfig-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605874" comment="sane-backends-devel-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605875" comment="sane-backends-devel-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12865</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12865" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605871" comment="sane-backends-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605872" comment="sane-backends-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605873" comment="sane-backends-autoconfig-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605874" comment="sane-backends-devel-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605875" comment="sane-backends-devel-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12866</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12866" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605871" comment="sane-backends-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605872" comment="sane-backends-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605873" comment="sane-backends-autoconfig-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605874" comment="sane-backends-devel-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605875" comment="sane-backends-devel-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12867</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, aka GHSL-2020-075.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605871" comment="sane-backends-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154031" comment="sane-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605872" comment="sane-backends-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154032" comment="sane-backends-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605873" comment="sane-backends-autoconfig-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154033" comment="sane-backends-autoconfig is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605874" comment="sane-backends-devel-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154034" comment="sane-backends-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605875" comment="sane-backends-devel-32bit-1.0.31-lp151.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297781" comment="sane-backends-devel-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12888</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12888" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179612">SUSE bug 1179612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13112</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13112" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112</cve>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608454" comment="libexif-devel-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608455" comment="libexif-devel-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279253" comment="libexif-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608456" comment="libexif12-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608457" comment="libexif12-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13113</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13113" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113</cve>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608454" comment="libexif-devel-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608455" comment="libexif-devel-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279253" comment="libexif-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608456" comment="libexif12-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608457" comment="libexif12-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13114</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13114" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114</cve>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608454" comment="libexif-devel-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151729" comment="libexif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608455" comment="libexif-devel-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279253" comment="libexif-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608456" comment="libexif12-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151730" comment="libexif12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608457" comment="libexif12-32bit-0.6.22-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151731" comment="libexif12-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13143</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608548" comment="kernel-debug-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608549" comment="kernel-debug-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608550" comment="kernel-debug-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608551" comment="kernel-default-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608552" comment="kernel-default-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608553" comment="kernel-default-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608554" comment="kernel-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608555" comment="kernel-docs-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608556" comment="kernel-docs-html-4.12.14-lp151.28.52.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608557" comment="kernel-kvmsmall-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608558" comment="kernel-kvmsmall-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608559" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608560" comment="kernel-macros-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608561" comment="kernel-obs-build-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608562" comment="kernel-obs-qa-4.12.14-lp151.28.52.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608563" comment="kernel-source-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608564" comment="kernel-source-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608565" comment="kernel-syms-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608566" comment="kernel-vanilla-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608567" comment="kernel-vanilla-base-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608568" comment="kernel-vanilla-devel-4.12.14-lp151.28.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13164" ref_url="https://www.suse.com/security/cve/CVE-2020-13164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.3, 3.0.0 to 3.0.10, and 2.6.0 to 2.6.16, the NFS dissector could crash. This was addressed in epan/dissectors/packet-nfs.c by preventing excessive recursion, such as for a cycle in the directory graph on a filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13164/">CVE-2020-13164</cve>
	<bugzilla href="https://bugzilla.suse.com/1171899">SUSE bug 1171899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604597" comment="libwireshark13-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604598" comment="libwiretap10-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604599" comment="libwsutil11-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604600" comment="wireshark-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604601" comment="wireshark-devel-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604602" comment="wireshark-ui-qt-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13249</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13249" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    libmariadb/mariadb_lib.c in MariaDB Connector/C before 3.1.8 does not properly validate the content of an OK packet received from a server. NOTE: although mariadb_lib.c was originally based on code shipped for MySQL, this issue does not affect any MySQL components supported by Oracle.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608197" comment="libmariadb-devel-3.1.8-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608198" comment="libmariadb3-3.1.8-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608199" comment="libmariadb3-32bit-3.1.8-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608200" comment="libmariadb_plugins-3.1.8-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608201" comment="libmariadbprivate-3.1.8-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609060" comment="libmysqld-devel-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609061" comment="libmysqld19-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609062" comment="mariadb-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609063" comment="mariadb-bench-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609064" comment="mariadb-client-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609065" comment="mariadb-errormessages-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609066" comment="mariadb-galera-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609067" comment="mariadb-test-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609068" comment="mariadb-tools-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13396</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13396" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13396" ref_url="https://www.suse.com/security/cve/CVE-2020-13396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13396/">CVE-2020-13396</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13397</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13397" ref_url="https://www.suse.com/security/cve/CVE-2020-13397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13397/">CVE-2020-13397</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13398</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13398" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13398" ref_url="https://www.suse.com/security/cve/CVE-2020-13398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) write vulnerability has been detected in crypto_rsa_common in libfreerdp/crypto/crypto.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13398/">CVE-2020-13398</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13401</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13401" ref_url="https://www.suse.com/security/cve/CVE-2020-13401" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006968.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00040.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13401/">CVE-2020-13401</cve>
	<bugzilla href="https://bugzilla.suse.com/1172375">SUSE bug 1172375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172377">SUSE bug 1172377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608908" comment="containerd-1.2.13-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608909" comment="containerd-ctr-1.2.13-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153865" comment="containerd-ctr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608910" comment="docker-19.03.11_ce-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608911" comment="docker-bash-completion-19.03.11_ce-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608912" comment="docker-libnetwork-0.7.0.1+gitr2902_153d0769a118-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171077" comment="docker-libnetwork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608913" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171078" comment="docker-runc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608914" comment="docker-test-19.03.11_ce-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152507" comment="docker-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608915" comment="docker-zsh-completion-19.03.11_ce-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608916" comment="golang-github-docker-libnetwork-0.7.0.1+gitr2902_153d0769a118-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171080" comment="golang-github-docker-libnetwork is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13428</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13428" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13428" ref_url="https://www.suse.com/security/cve/CVE-2020-13428" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD6C4CTIQTZF237437FPGD5AIRV33TET/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KIZQCEFFNAB3CPF433JKRUT3ZM2EDM33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0121-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IYGQU4F6PPW4XHK4LTESKSQ2CPHZS3QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0122-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJCT5WYFJXXNRF5NSC7LOIHN7BD5UKVV/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the hxxx_AnnexB_to_xVC function in modules/packetizer/hxxx_nal.c in VideoLAN VLC media player before 3.0.11 for macOS/iOS allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted H.264 Annex-B video (.avi for example) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13428/">CVE-2020-13428</cve>
	<bugzilla href="https://bugzilla.suse.com/1172727">SUSE bug 1172727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609539" comment="libvlc5-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609540" comment="libvlccore9-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609541" comment="vlc-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609542" comment="vlc-codec-gstreamer-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609543" comment="vlc-devel-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609544" comment="vlc-jack-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609545" comment="vlc-lang-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609546" comment="vlc-noX-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609547" comment="vlc-opencv-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609548" comment="vlc-qt-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609549" comment="vlc-vdpau-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543</cve>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606852" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606853" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606854" comment="libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606855" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606856" comment="libwebkit2gtk3-lang-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606857" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606858" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606859" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606860" comment="webkit-jsc-4-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606861" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606862" comment="webkit2gtk3-devel-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606863" comment="webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13584</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
    <description>
    An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606852" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606853" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606854" comment="libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606855" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606856" comment="libwebkit2gtk3-lang-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606857" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606858" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606859" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606860" comment="webkit-jsc-4-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606861" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606862" comment="webkit2gtk3-devel-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606863" comment="webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13614</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13614" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13614" ref_url="https://www.suse.com/security/cve/CVE-2020-13614" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13614/">CVE-2020-13614</cve>
	<bugzilla href="https://bugzilla.suse.com/1172159">SUSE bug 1172159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608255" comment="axel-2.17.8-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284618" comment="axel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13625</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13625" ref_url="https://www.suse.com/security/cve/CVE-2020-13625" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" source="SUSE-SU"/>
    <description>
    PHPMailer before 6.1.6 contains an output escaping bug when the name of a file attachment contains a double quote character. This can result in the file type being misinterpreted by the receiver or any mail relay processing the message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-13625/">CVE-2020-13625</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609828" comment="cacti-1.2.13-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609829" comment="cacti-spine-1.2.13-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13696" ref_url="https://www.suse.com/security/cve/CVE-2020-13696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0787-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00013.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13696/">CVE-2020-13696</cve>
	<bugzilla href="https://bugzilla.suse.com/1171655">SUSE bug 1171655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608276" comment="alevtd-3.103-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284619" comment="alevtd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608277" comment="motv-3.103-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284620" comment="motv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608278" comment="pia-3.103-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284621" comment="pia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608279" comment="tv-common-3.103-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284622" comment="tv-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608280" comment="v4l-conf-3.103-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284623" comment="v4l-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608281" comment="v4l-tools-3.103-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284624" comment="v4l-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608282" comment="xawtv-3.103-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009284625" comment="xawtv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13753</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604389" comment="libjavascriptcoregtk-4_0-18-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604390" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604391" comment="libwebkit2gtk-4_0-37-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604392" comment="libwebkit2gtk-4_0-37-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604393" comment="libwebkit2gtk3-lang-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604394" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604395" comment="typelib-1_0-WebKit2-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604396" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604397" comment="webkit-jsc-4-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604398" comment="webkit2gtk-4_0-injected-bundles-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604399" comment="webkit2gtk3-devel-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604400" comment="webkit2gtk3-minibrowser-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13777</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13777" ref_url="https://www.suse.com/security/cve/CVE-2020-13777" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006910.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00015.html" source="SUSE-SU"/>
    <description>
    GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13777/">CVE-2020-13777</cve>
	<bugzilla href="https://bugzilla.suse.com/1172461">SUSE bug 1172461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172506">SUSE bug 1172506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608441" comment="gnutls-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608442" comment="gnutls-guile-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235743" comment="gnutls-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608443" comment="libgnutls-dane-devel-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235744" comment="libgnutls-dane-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608444" comment="libgnutls-dane0-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177127" comment="libgnutls-dane0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608445" comment="libgnutls-devel-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608446" comment="libgnutls-devel-32bit-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608447" comment="libgnutls30-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608448" comment="libgnutls30-32bit-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235745" comment="libgnutls30-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608449" comment="libgnutls30-hmac-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608450" comment="libgnutls30-hmac-32bit-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281489" comment="libgnutls30-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608451" comment="libgnutlsxx-devel-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608452" comment="libgnutlsxx28-3.6.7-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13790</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13790" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007379.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1413-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00062.html" source="SUSE-SU"/>
    <description>
    libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790</cve>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605190" comment="libjpeg-turbo-1.5.3-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152540" comment="libjpeg-turbo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605191" comment="libjpeg62-62.2.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152541" comment="libjpeg62 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605192" comment="libjpeg62-32bit-62.2.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166381" comment="libjpeg62-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605193" comment="libjpeg62-devel-62.2.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152542" comment="libjpeg62-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605194" comment="libjpeg62-devel-32bit-62.2.0-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166384" comment="libjpeg62-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605195" comment="libjpeg62-turbo-1.5.3-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166386" comment="libjpeg62-turbo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605196" comment="libjpeg8-8.1.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152543" comment="libjpeg8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605197" comment="libjpeg8-32bit-8.1.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152544" comment="libjpeg8-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605198" comment="libjpeg8-devel-8.1.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166390" comment="libjpeg8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605199" comment="libjpeg8-devel-32bit-8.1.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166392" comment="libjpeg8-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605200" comment="libturbojpeg0-8.1.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152545" comment="libturbojpeg0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605201" comment="libturbojpeg0-32bit-8.1.2-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166395" comment="libturbojpeg0-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13817</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13817" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609184" comment="ntp-4.2.8p15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609185" comment="ntp-doc-4.2.8p15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13844</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007963.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4EOEHZ7Q27TTGN54YMFIIKDEJ5OS3SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OIESM64GYREKLMRLTSQUIOYAUT6QG6A2/" source="SUSE-SU"/>
    <description>
    Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605583" comment="cpp10-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296079" comment="cpp10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606821" comment="cpp7-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268648" comment="cpp7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605584" comment="cross-nvptx-gcc10-10.2.1+git583-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296080" comment="cross-nvptx-gcc10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605585" comment="cross-nvptx-newlib10-devel-10.2.1+git583-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296081" comment="cross-nvptx-newlib10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605586" comment="gcc10-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296082" comment="gcc10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605587" comment="gcc10-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296083" comment="gcc10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605588" comment="gcc10-ada-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296084" comment="gcc10-ada is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605589" comment="gcc10-ada-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296085" comment="gcc10-ada-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605590" comment="gcc10-c++-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296086" comment="gcc10-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605591" comment="gcc10-c++-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296087" comment="gcc10-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605592" comment="gcc10-d-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296088" comment="gcc10-d is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605593" comment="gcc10-d-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296089" comment="gcc10-d-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605594" comment="gcc10-fortran-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296090" comment="gcc10-fortran is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605595" comment="gcc10-fortran-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296091" comment="gcc10-fortran-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605596" comment="gcc10-go-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296092" comment="gcc10-go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605597" comment="gcc10-go-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296093" comment="gcc10-go-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605598" comment="gcc10-info-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296094" comment="gcc10-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605599" comment="gcc10-locale-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296095" comment="gcc10-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605600" comment="gcc10-obj-c++-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296096" comment="gcc10-obj-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605601" comment="gcc10-obj-c++-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296097" comment="gcc10-obj-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605602" comment="gcc10-objc-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296098" comment="gcc10-objc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605603" comment="gcc10-objc-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296099" comment="gcc10-objc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606822" comment="gcc7-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268649" comment="gcc7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606823" comment="gcc7-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268650" comment="gcc7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606824" comment="gcc7-ada-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268651" comment="gcc7-ada is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606825" comment="gcc7-ada-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268652" comment="gcc7-ada-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606826" comment="gcc7-c++-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268653" comment="gcc7-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606827" comment="gcc7-c++-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268654" comment="gcc7-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606828" comment="gcc7-fortran-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268655" comment="gcc7-fortran is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606829" comment="gcc7-fortran-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268656" comment="gcc7-fortran-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606830" comment="gcc7-go-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268657" comment="gcc7-go is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606831" comment="gcc7-go-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268658" comment="gcc7-go-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606832" comment="gcc7-info-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268659" comment="gcc7-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606833" comment="gcc7-locale-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268660" comment="gcc7-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606834" comment="gcc7-obj-c++-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268661" comment="gcc7-obj-c++ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606835" comment="gcc7-obj-c++-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268662" comment="gcc7-obj-c++-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606836" comment="gcc7-objc-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268663" comment="gcc7-objc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606837" comment="gcc7-objc-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268664" comment="gcc7-objc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605604" comment="libada10-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296100" comment="libada10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605605" comment="libada10-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296101" comment="libada10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606838" comment="libada7-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268665" comment="libada7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606839" comment="libada7-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268666" comment="libada7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606840" comment="libasan4-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268667" comment="libasan4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606841" comment="libasan4-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268668" comment="libasan4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605606" comment="libasan6-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296102" comment="libasan6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605607" comment="libasan6-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296103" comment="libasan6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605608" comment="libatomic1-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152915" comment="libatomic1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605609" comment="libatomic1-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152916" comment="libatomic1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606842" comment="libcilkrts5-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152919" comment="libcilkrts5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606843" comment="libcilkrts5-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152920" comment="libcilkrts5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605610" comment="libgcc_s1-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152931" comment="libgcc_s1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605611" comment="libgcc_s1-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152932" comment="libgcc_s1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605612" comment="libgdruntime1-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296104" comment="libgdruntime1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605613" comment="libgdruntime1-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296105" comment="libgdruntime1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606844" comment="libgfortran4-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268669" comment="libgfortran4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606845" comment="libgfortran4-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268670" comment="libgfortran4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605614" comment="libgfortran5-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283969" comment="libgfortran5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605615" comment="libgfortran5-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283970" comment="libgfortran5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606846" comment="libgo11-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268671" comment="libgo11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606847" comment="libgo11-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268672" comment="libgo11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605616" comment="libgo16-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296106" comment="libgo16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605617" comment="libgo16-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296107" comment="libgo16-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605618" comment="libgomp1-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152942" comment="libgomp1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605619" comment="libgomp1-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152943" comment="libgomp1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605620" comment="libgphobos1-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296108" comment="libgphobos1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605621" comment="libgphobos1-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296109" comment="libgphobos1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605622" comment="libitm1-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152946" comment="libitm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605623" comment="libitm1-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152947" comment="libitm1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605624" comment="liblsan0-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152950" comment="liblsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605625" comment="libobjc4-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152198" comment="libobjc4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605626" comment="libobjc4-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152955" comment="libobjc4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605627" comment="libquadmath0-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152956" comment="libquadmath0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605628" comment="libquadmath0-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152957" comment="libquadmath0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605629" comment="libstdc++6-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152962" comment="libstdc++6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605630" comment="libstdc++6-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152963" comment="libstdc++6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605631" comment="libstdc++6-devel-gcc10-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296110" comment="libstdc++6-devel-gcc10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605632" comment="libstdc++6-devel-gcc10-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296111" comment="libstdc++6-devel-gcc10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606848" comment="libstdc++6-devel-gcc7-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268673" comment="libstdc++6-devel-gcc7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606849" comment="libstdc++6-devel-gcc7-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268674" comment="libstdc++6-devel-gcc7-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605633" comment="libstdc++6-locale-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152968" comment="libstdc++6-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605634" comment="libstdc++6-pp-gcc10-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296112" comment="libstdc++6-pp-gcc10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605635" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296113" comment="libstdc++6-pp-gcc10-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605636" comment="libtsan0-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152969" comment="libtsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606850" comment="libubsan0-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152971" comment="libubsan0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606851" comment="libubsan0-32bit-7.5.0+r278197-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152972" comment="libubsan0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605637" comment="libubsan1-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283977" comment="libubsan1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605638" comment="libubsan1-32bit-10.2.1+git583-lp151.2.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283978" comment="libubsan1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605639" comment="nvptx-tools-1.0-lp151.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296114" comment="nvptx-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13845</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13845" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13845" ref_url="https://www.suse.com/security/cve/CVE-2020-13845" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity 3.0 through 3.5 has Improper Validation of an Integrity Check Value. Image integrity is not validated when an ECL policy is enforced. The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13845/">CVE-2020-13845</cve>
	<bugzilla href="https://bugzilla.suse.com/1174150">SUSE bug 1174150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604366" comment="singularity-3.6.0-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13846" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13846" ref_url="https://www.suse.com/security/cve/CVE-2020-13846" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity 3.5.0 through 3.5.3 fails to report an error in a Status Code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13846/">CVE-2020-13846</cve>
	<bugzilla href="https://bugzilla.suse.com/1174148">SUSE bug 1174148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604366" comment="singularity-3.6.0-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13847</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13847" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13847" ref_url="https://www.suse.com/security/cve/CVE-2020-13847" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity 3.0 through 3.5 lacks support for an Integrity Check. Singularity's sign and verify commands do not sign metadata found in the global header or data object descriptors of a SIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13847/">CVE-2020-13847</cve>
	<bugzilla href="https://bugzilla.suse.com/1174152">SUSE bug 1174152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604366" comment="singularity-3.6.0-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13848</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13848" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13848" ref_url="https://www.suse.com/security/cve/CVE-2020-13848" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13848/">CVE-2020-13848</cve>
	<bugzilla href="https://bugzilla.suse.com/1172625">SUSE bug 1172625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608816" comment="libupnp-devel-1.6.25-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009156372" comment="libupnp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608817" comment="libupnp6-1.6.25-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154113" comment="libupnp6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608818" comment="libupnp6-32bit-1.6.25-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009156373" comment="libupnp6-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13867</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007313.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00005.html" source="SUSE-SU"/>
    <description>
    Open-iSCSI targetcli-fb through 2.1.52 has weak permissions for /etc/target (and for the backup directory and backup files).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867</cve>
	<bugzilla href="https://bugzilla.suse.com/1172743">SUSE bug 1172743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604476" comment="python2-targetcli-fb-2.1.49-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009288926" comment="python2-targetcli-fb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604477" comment="python3-targetcli-fb-2.1.49-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009288927" comment="python3-targetcli-fb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604478" comment="targetcli-fb-common-2.1.49-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009288929" comment="targetcli-fb-common is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13934</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13934" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13934" ref_url="https://www.suse.com/security/cve/CVE-2020-13934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007182.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html" source="SUSE-SU"/>
    <description>
    An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13934/">CVE-2020-13934</cve>
	<bugzilla href="https://bugzilla.suse.com/1174121">SUSE bug 1174121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604444" comment="tomcat-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604445" comment="tomcat-admin-webapps-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604446" comment="tomcat-docs-webapp-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604447" comment="tomcat-el-3_0-api-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604448" comment="tomcat-embed-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604449" comment="tomcat-javadoc-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604450" comment="tomcat-jsp-2_3-api-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604451" comment="tomcat-jsvc-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604452" comment="tomcat-lib-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604453" comment="tomcat-servlet-4_0-api-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604454" comment="tomcat-webapps-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html" source="SUSE-SU"/>
    <description>
    The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935</cve>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604444" comment="tomcat-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604445" comment="tomcat-admin-webapps-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604446" comment="tomcat-docs-webapp-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604447" comment="tomcat-el-3_0-api-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604448" comment="tomcat-embed-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604449" comment="tomcat-javadoc-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604450" comment="tomcat-jsp-2_3-api-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604451" comment="tomcat-jsvc-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604452" comment="tomcat-lib-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604453" comment="tomcat-servlet-4_0-api-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604454" comment="tomcat-webapps-9.0.36-lp151.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13943</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13943" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13943" ref_url="https://www.suse.com/security/cve/CVE-2020-13943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html" source="SUSE-SU"/>
    <description>
    If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13943/">CVE-2020-13943</cve>
	<bugzilla href="https://bugzilla.suse.com/1177582">SUSE bug 1177582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605991" comment="tomcat-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605992" comment="tomcat-admin-webapps-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605993" comment="tomcat-docs-webapp-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605994" comment="tomcat-el-3_0-api-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605995" comment="tomcat-embed-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605996" comment="tomcat-javadoc-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605997" comment="tomcat-jsp-2_3-api-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605998" comment="tomcat-jsvc-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605999" comment="tomcat-lib-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606000" comment="tomcat-servlet-4_0-api-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606001" comment="tomcat-webapps-9.0.36-lp151.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14004</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14004" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14004" ref_url="https://www.suse.com/security/cve/CVE-2020-14004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1820-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14004/">CVE-2020-14004</cve>
	<bugzilla href="https://bugzilla.suse.com/1172171">SUSE bug 1172171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609850" comment="icinga2-2.12.1-lp151.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297975" comment="icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609851" comment="icinga2-bin-2.12.1-lp151.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297977" comment="icinga2-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609852" comment="icinga2-common-2.12.1-lp151.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297979" comment="icinga2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609853" comment="icinga2-doc-2.12.1-lp151.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297981" comment="icinga2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609854" comment="icinga2-ido-mysql-2.12.1-lp151.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297983" comment="icinga2-ido-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609855" comment="icinga2-ido-pgsql-2.12.1-lp151.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297985" comment="icinga2-ido-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609856" comment="nano-icinga2-2.12.1-lp151.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297987" comment="nano-icinga2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609857" comment="vim-icinga2-2.12.1-lp151.2.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297989" comment="vim-icinga2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14039" ref_url="https://www.suse.com/security/cve/CVE-2020-14039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" source="SUSE-SU"/>
    <description>
    In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14039/">CVE-2020-14039</cve>
	<bugzilla href="https://bugzilla.suse.com/1174191">SUSE bug 1174191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604419" comment="go1.13-1.13.14-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287972" comment="go1.13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604420" comment="go1.13-doc-1.13.14-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287973" comment="go1.13-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604421" comment="go1.13-race-1.13.14-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287974" comment="go1.13-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605187" comment="go1.14-1.14.7-lp151.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605188" comment="go1.14-doc-1.14.7-lp151.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605189" comment="go1.14-race-1.14.7-lp151.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14059</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14059" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 5.x before 5.0.3. Due to an Incorrect Synchronization, a Denial of Service can occur when processing objects in an SMP cache because of an Ipc::Mem::PageStack::pop ABA problem during access to the memory page/slot management list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<bugzilla href="https://bugzilla.suse.com/1173303">SUSE bug 1173303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609126" comment="squid-4.12-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14093</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14093" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609115" comment="mutt-1.10.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609116" comment="mutt-doc-1.10.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609117" comment="mutt-lang-1.10.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609858" comment="neomutt-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302848" comment="neomutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609859" comment="neomutt-doc-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302850" comment="neomutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609860" comment="neomutt-lang-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302852" comment="neomutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTSUNUWKKFI2BZV3IR5RLHAQFXINNKM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D34ALFN2MMC67CCWTOANPH5DLTSAHLOG/" source="SUSE-SU"/>
    <description>
    The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177569">SUSE bug 1177569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189078">SUSE bug 1189078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606810" comment="openssh-7.9p1-lp151.4.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606811" comment="openssh-askpass-gnome-7.9p1-lp151.4.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606812" comment="openssh-cavs-7.9p1-lp151.4.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606813" comment="openssh-fips-7.9p1-lp151.4.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606814" comment="openssh-helpers-7.9p1-lp151.4.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14147</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14147" ref_url="https://www.suse.com/security/cve/CVE-2020-14147" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14147/">CVE-2020-14147</cve>
	<bugzilla href="https://bugzilla.suse.com/1173018">SUSE bug 1173018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609861" comment="redis-4.0.14-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14149</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14149" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14149" ref_url="https://www.suse.com/security/cve/CVE-2020-14149" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00052.html" source="SUSE-SU"/>
    <description>
    In uftpd before 2.12, handle_CWD in ftpcmd.c mishandled the path provided by the user, causing a NULL pointer dereference and denial of service, as demonstrated by a CWD /.. command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14149/">CVE-2020-14149</cve>
	<bugzilla href="https://bugzilla.suse.com/1172959">SUSE bug 1172959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609049" comment="uftpd-2.12-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276159" comment="uftpd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14154" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609115" comment="mutt-1.10.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609116" comment="mutt-doc-1.10.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609117" comment="mutt-lang-1.10.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609858" comment="neomutt-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302848" comment="neomutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609859" comment="neomutt-doc-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302850" comment="neomutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609860" comment="neomutt-lang-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302852" comment="neomutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14196</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14196" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14196" ref_url="https://www.suse.com/security/cve/CVE-2020-14196" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1055-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00134.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" source="SUSE-SU"/>
    <description>
    In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14196/">CVE-2020-14196</cve>
	<bugzilla href="https://bugzilla.suse.com/1173302">SUSE bug 1173302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609862" comment="pdns-recursor-4.1.12-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153799" comment="pdns-recursor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14295</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14295" ref_url="https://www.suse.com/security/cve/CVE-2020-14295" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" source="SUSE-SU"/>
    <description>
    A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14295/">CVE-2020-14295</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609828" comment="cacti-1.2.13-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609829" comment="cacti-spine-1.2.13-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14303</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14303" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14303" ref_url="https://www.suse.com/security/cve/CVE-2020-14303" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0984-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14303/">CVE-2020-14303</cve>
	<bugzilla href="https://bugzilla.suse.com/1173359">SUSE bug 1173359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609250" comment="ctdb-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609251" comment="ctdb-pcp-pmda-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609252" comment="ctdb-tests-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609253" comment="libdcerpc-binding0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609254" comment="libdcerpc-binding0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609255" comment="libdcerpc-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609256" comment="libdcerpc-samr-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609257" comment="libdcerpc-samr0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609258" comment="libdcerpc-samr0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609259" comment="libdcerpc0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609260" comment="libdcerpc0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609261" comment="libndr-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609262" comment="libndr-krb5pac-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609263" comment="libndr-krb5pac0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609264" comment="libndr-krb5pac0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609265" comment="libndr-nbt-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609266" comment="libndr-nbt0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609267" comment="libndr-nbt0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609268" comment="libndr-standard-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609269" comment="libndr-standard0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609270" comment="libndr-standard0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609271" comment="libndr0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609272" comment="libndr0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609273" comment="libnetapi-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609274" comment="libnetapi-devel-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609275" comment="libnetapi0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609276" comment="libnetapi0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609277" comment="libsamba-credentials-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609278" comment="libsamba-credentials0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609279" comment="libsamba-credentials0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609280" comment="libsamba-errors-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609281" comment="libsamba-errors0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609282" comment="libsamba-errors0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609283" comment="libsamba-hostconfig-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609284" comment="libsamba-hostconfig0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609285" comment="libsamba-hostconfig0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609286" comment="libsamba-passdb-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609287" comment="libsamba-passdb0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609288" comment="libsamba-passdb0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609289" comment="libsamba-policy-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609290" comment="libsamba-policy-python-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609291" comment="libsamba-policy-python3-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609292" comment="libsamba-policy0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609293" comment="libsamba-policy0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609294" comment="libsamba-policy0-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609295" comment="libsamba-policy0-python3-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609296" comment="libsamba-util-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609297" comment="libsamba-util0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609298" comment="libsamba-util0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609299" comment="libsamdb-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609300" comment="libsamdb0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609301" comment="libsamdb0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609302" comment="libsmbclient-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609303" comment="libsmbclient0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609304" comment="libsmbclient0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609305" comment="libsmbconf-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609306" comment="libsmbconf0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609307" comment="libsmbconf0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609308" comment="libsmbldap-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609309" comment="libsmbldap2-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609310" comment="libsmbldap2-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609311" comment="libtevent-util-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609312" comment="libtevent-util0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609313" comment="libtevent-util0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609314" comment="libwbclient-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609315" comment="libwbclient0-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609316" comment="libwbclient0-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609317" comment="samba-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609318" comment="samba-ad-dc-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609319" comment="samba-ad-dc-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609320" comment="samba-ceph-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609321" comment="samba-client-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609322" comment="samba-client-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609323" comment="samba-core-devel-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609324" comment="samba-doc-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609325" comment="samba-dsdb-modules-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609326" comment="samba-libs-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609327" comment="samba-libs-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609328" comment="samba-libs-python-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609329" comment="samba-libs-python-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609330" comment="samba-libs-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609331" comment="samba-libs-python3-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609332" comment="samba-pidl-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609333" comment="samba-python-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609334" comment="samba-python3-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609335" comment="samba-test-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609336" comment="samba-winbind-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609337" comment="samba-winbind-32bit-4.9.5+git.343.4bc358522a9-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14308</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14308" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604572" comment="grub2-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604573" comment="grub2-branding-upstream-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604574" comment="grub2-i386-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604575" comment="grub2-i386-pc-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604576" comment="grub2-i386-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604577" comment="grub2-snapper-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604578" comment="grub2-systemd-sleep-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604579" comment="grub2-x86_64-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604580" comment="grub2-x86_64-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14309</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14309" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604572" comment="grub2-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604573" comment="grub2-branding-upstream-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604574" comment="grub2-i386-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604575" comment="grub2-i386-pc-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604576" comment="grub2-i386-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604577" comment="grub2-snapper-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604578" comment="grub2-systemd-sleep-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604579" comment="grub2-x86_64-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604580" comment="grub2-x86_64-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14310</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14310" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604572" comment="grub2-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604573" comment="grub2-branding-upstream-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604574" comment="grub2-i386-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604575" comment="grub2-i386-pc-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604576" comment="grub2-i386-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604577" comment="grub2-snapper-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604578" comment="grub2-systemd-sleep-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604579" comment="grub2-x86_64-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604580" comment="grub2-x86_64-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14311</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14311" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604572" comment="grub2-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604573" comment="grub2-branding-upstream-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604574" comment="grub2-i386-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604575" comment="grub2-i386-pc-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604576" comment="grub2-i386-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604577" comment="grub2-snapper-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604578" comment="grub2-systemd-sleep-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604579" comment="grub2-x86_64-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604580" comment="grub2-x86_64-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14314</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605046" comment="kernel-debug-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605047" comment="kernel-debug-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605048" comment="kernel-debug-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605049" comment="kernel-default-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605050" comment="kernel-default-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605051" comment="kernel-default-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605052" comment="kernel-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605053" comment="kernel-docs-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605054" comment="kernel-docs-html-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605055" comment="kernel-kvmsmall-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605056" comment="kernel-kvmsmall-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605057" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605058" comment="kernel-macros-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605059" comment="kernel-obs-build-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605060" comment="kernel-obs-qa-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605061" comment="kernel-source-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605062" comment="kernel-source-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605063" comment="kernel-syms-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605064" comment="kernel-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605065" comment="kernel-vanilla-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605066" comment="kernel-vanilla-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14318</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605884" comment="ctdb-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605885" comment="ctdb-pcp-pmda-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605886" comment="ctdb-tests-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605887" comment="libdcerpc-binding0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605888" comment="libdcerpc-binding0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605889" comment="libdcerpc-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605890" comment="libdcerpc-samr-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605891" comment="libdcerpc-samr0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605892" comment="libdcerpc-samr0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605893" comment="libdcerpc0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605894" comment="libdcerpc0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605895" comment="libndr-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605896" comment="libndr-krb5pac-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605897" comment="libndr-krb5pac0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605898" comment="libndr-krb5pac0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605899" comment="libndr-nbt-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605900" comment="libndr-nbt0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605901" comment="libndr-nbt0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605902" comment="libndr-standard-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605903" comment="libndr-standard0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605904" comment="libndr-standard0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605905" comment="libndr0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605906" comment="libndr0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605907" comment="libnetapi-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605908" comment="libnetapi-devel-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605909" comment="libnetapi0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605910" comment="libnetapi0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605911" comment="libsamba-credentials-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605912" comment="libsamba-credentials0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605913" comment="libsamba-credentials0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605914" comment="libsamba-errors-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605915" comment="libsamba-errors0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605916" comment="libsamba-errors0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605917" comment="libsamba-hostconfig-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605918" comment="libsamba-hostconfig0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605919" comment="libsamba-hostconfig0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605920" comment="libsamba-passdb-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605921" comment="libsamba-passdb0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605922" comment="libsamba-passdb0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605923" comment="libsamba-policy-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605924" comment="libsamba-policy-python-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605925" comment="libsamba-policy-python3-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605926" comment="libsamba-policy0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605927" comment="libsamba-policy0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605928" comment="libsamba-policy0-python3-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605929" comment="libsamba-policy0-python3-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605930" comment="libsamba-util-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605931" comment="libsamba-util0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605932" comment="libsamba-util0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605933" comment="libsamdb-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605934" comment="libsamdb0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605935" comment="libsamdb0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605936" comment="libsmbclient-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605937" comment="libsmbclient0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605938" comment="libsmbclient0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605939" comment="libsmbconf-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605940" comment="libsmbconf0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605941" comment="libsmbconf0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605942" comment="libsmbldap-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605943" comment="libsmbldap2-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605944" comment="libsmbldap2-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605945" comment="libtevent-util-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605946" comment="libtevent-util0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605947" comment="libtevent-util0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605948" comment="libwbclient-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605949" comment="libwbclient0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605950" comment="libwbclient0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605951" comment="samba-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605952" comment="samba-ad-dc-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605953" comment="samba-ad-dc-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605954" comment="samba-ceph-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605955" comment="samba-client-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605956" comment="samba-client-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605957" comment="samba-core-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605958" comment="samba-doc-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605959" comment="samba-dsdb-modules-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605960" comment="samba-libs-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605961" comment="samba-libs-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605962" comment="samba-libs-python-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605963" comment="samba-libs-python-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605964" comment="samba-libs-python3-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605965" comment="samba-libs-python3-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605966" comment="samba-pidl-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605967" comment="samba-python-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605968" comment="samba-python3-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605969" comment="samba-test-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605970" comment="samba-winbind-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605971" comment="samba-winbind-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14323</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605884" comment="ctdb-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605885" comment="ctdb-pcp-pmda-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605886" comment="ctdb-tests-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605887" comment="libdcerpc-binding0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605888" comment="libdcerpc-binding0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605889" comment="libdcerpc-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605890" comment="libdcerpc-samr-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605891" comment="libdcerpc-samr0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605892" comment="libdcerpc-samr0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605893" comment="libdcerpc0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605894" comment="libdcerpc0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605895" comment="libndr-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605896" comment="libndr-krb5pac-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605897" comment="libndr-krb5pac0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605898" comment="libndr-krb5pac0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605899" comment="libndr-nbt-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605900" comment="libndr-nbt0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605901" comment="libndr-nbt0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605902" comment="libndr-standard-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605903" comment="libndr-standard0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605904" comment="libndr-standard0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605905" comment="libndr0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605906" comment="libndr0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605907" comment="libnetapi-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605908" comment="libnetapi-devel-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605909" comment="libnetapi0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605910" comment="libnetapi0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605911" comment="libsamba-credentials-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605912" comment="libsamba-credentials0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605913" comment="libsamba-credentials0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605914" comment="libsamba-errors-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605915" comment="libsamba-errors0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605916" comment="libsamba-errors0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605917" comment="libsamba-hostconfig-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605918" comment="libsamba-hostconfig0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605919" comment="libsamba-hostconfig0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605920" comment="libsamba-passdb-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605921" comment="libsamba-passdb0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605922" comment="libsamba-passdb0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605923" comment="libsamba-policy-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605924" comment="libsamba-policy-python-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605925" comment="libsamba-policy-python3-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605926" comment="libsamba-policy0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605927" comment="libsamba-policy0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605928" comment="libsamba-policy0-python3-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605929" comment="libsamba-policy0-python3-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605930" comment="libsamba-util-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605931" comment="libsamba-util0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605932" comment="libsamba-util0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605933" comment="libsamdb-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605934" comment="libsamdb0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605935" comment="libsamdb0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605936" comment="libsmbclient-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605937" comment="libsmbclient0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605938" comment="libsmbclient0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605939" comment="libsmbconf-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605940" comment="libsmbconf0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605941" comment="libsmbconf0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605942" comment="libsmbldap-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605943" comment="libsmbldap2-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605944" comment="libsmbldap2-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605945" comment="libtevent-util-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605946" comment="libtevent-util0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605947" comment="libtevent-util0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605948" comment="libwbclient-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605949" comment="libwbclient0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605950" comment="libwbclient0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605951" comment="samba-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605952" comment="samba-ad-dc-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605953" comment="samba-ad-dc-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605954" comment="samba-ceph-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605955" comment="samba-client-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605956" comment="samba-client-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605957" comment="samba-core-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605958" comment="samba-doc-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605959" comment="samba-dsdb-modules-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605960" comment="samba-libs-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605961" comment="samba-libs-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605962" comment="samba-libs-python-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605963" comment="samba-libs-python-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605964" comment="samba-libs-python3-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605965" comment="samba-libs-python3-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605966" comment="samba-pidl-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605967" comment="samba-python-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605968" comment="samba-python3-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605969" comment="samba-test-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605970" comment="samba-winbind-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605971" comment="samba-winbind-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14331</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605046" comment="kernel-debug-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605047" comment="kernel-debug-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605048" comment="kernel-debug-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605049" comment="kernel-default-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605050" comment="kernel-default-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605051" comment="kernel-default-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605052" comment="kernel-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605053" comment="kernel-docs-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605054" comment="kernel-docs-html-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605055" comment="kernel-kvmsmall-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605056" comment="kernel-kvmsmall-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605057" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605058" comment="kernel-macros-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605059" comment="kernel-obs-build-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605060" comment="kernel-obs-qa-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605061" comment="kernel-source-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605062" comment="kernel-source-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605063" comment="kernel-syms-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605064" comment="kernel-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605065" comment="kernel-vanilla-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605066" comment="kernel-vanilla-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14342</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14342" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14342" ref_url="https://www.suse.com/security/cve/CVE-2020-14342" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0639-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/65NUX6IGI72XJIWLCF5QOKIKAWWJUMEY/" source="SUSE-SU"/>
    <description>
    It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14342/">CVE-2020-14342</cve>
	<bugzilla href="https://bugzilla.suse.com/1174477">SUSE bug 1174477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605479" comment="cifs-utils-6.9-lp151.4.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151261" comment="cifs-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605480" comment="cifs-utils-devel-6.9-lp151.4.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294754" comment="cifs-utils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605481" comment="pam_cifscreds-6.9-lp151.4.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294755" comment="pam_cifscreds is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14344</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007252.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1198-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html" source="SUSE-SU"/>
    <description>
    An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175880">SUSE bug 1175880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604610" comment="libX11-6-1.6.5-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604611" comment="libX11-6-32bit-1.6.5-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604612" comment="libX11-data-1.6.5-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604613" comment="libX11-devel-1.6.5-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604614" comment="libX11-devel-32bit-1.6.5-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604615" comment="libX11-xcb1-1.6.5-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604616" comment="libX11-xcb1-32bit-1.6.5-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604521" comment="libxcb-composite0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151866" comment="libxcb-composite0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604522" comment="libxcb-composite0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153818" comment="libxcb-composite0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604523" comment="libxcb-damage0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151867" comment="libxcb-damage0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604524" comment="libxcb-damage0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153819" comment="libxcb-damage0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604525" comment="libxcb-devel-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151868" comment="libxcb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604526" comment="libxcb-devel-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153820" comment="libxcb-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604527" comment="libxcb-devel-doc-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153821" comment="libxcb-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604528" comment="libxcb-dpms0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151869" comment="libxcb-dpms0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604529" comment="libxcb-dpms0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153822" comment="libxcb-dpms0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604530" comment="libxcb-dri2-0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151870" comment="libxcb-dri2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604531" comment="libxcb-dri2-0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151871" comment="libxcb-dri2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604532" comment="libxcb-dri3-0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151872" comment="libxcb-dri3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604533" comment="libxcb-dri3-0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151873" comment="libxcb-dri3-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604534" comment="libxcb-glx0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151874" comment="libxcb-glx0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604535" comment="libxcb-glx0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151875" comment="libxcb-glx0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604536" comment="libxcb-present0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151876" comment="libxcb-present0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604537" comment="libxcb-present0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151877" comment="libxcb-present0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604538" comment="libxcb-randr0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151878" comment="libxcb-randr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604539" comment="libxcb-randr0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153823" comment="libxcb-randr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604540" comment="libxcb-record0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151879" comment="libxcb-record0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604541" comment="libxcb-record0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153824" comment="libxcb-record0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604542" comment="libxcb-render0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151880" comment="libxcb-render0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604543" comment="libxcb-render0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151881" comment="libxcb-render0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604544" comment="libxcb-res0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151882" comment="libxcb-res0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604545" comment="libxcb-res0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153825" comment="libxcb-res0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604546" comment="libxcb-screensaver0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151883" comment="libxcb-screensaver0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604547" comment="libxcb-screensaver0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153826" comment="libxcb-screensaver0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604548" comment="libxcb-shape0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151884" comment="libxcb-shape0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604549" comment="libxcb-shape0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153827" comment="libxcb-shape0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604550" comment="libxcb-shm0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151885" comment="libxcb-shm0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604551" comment="libxcb-shm0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151886" comment="libxcb-shm0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604552" comment="libxcb-sync1-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151887" comment="libxcb-sync1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604553" comment="libxcb-sync1-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151888" comment="libxcb-sync1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604554" comment="libxcb-xf86dri0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151890" comment="libxcb-xf86dri0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604555" comment="libxcb-xf86dri0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153829" comment="libxcb-xf86dri0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604556" comment="libxcb-xfixes0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151891" comment="libxcb-xfixes0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604557" comment="libxcb-xfixes0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151892" comment="libxcb-xfixes0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604558" comment="libxcb-xinerama0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151893" comment="libxcb-xinerama0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604559" comment="libxcb-xinerama0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153830" comment="libxcb-xinerama0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604560" comment="libxcb-xinput0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177183" comment="libxcb-xinput0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604561" comment="libxcb-xinput0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289014" comment="libxcb-xinput0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604562" comment="libxcb-xkb1-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151894" comment="libxcb-xkb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604563" comment="libxcb-xkb1-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153831" comment="libxcb-xkb1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604564" comment="libxcb-xtest0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151896" comment="libxcb-xtest0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604565" comment="libxcb-xtest0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153833" comment="libxcb-xtest0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604566" comment="libxcb-xv0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151897" comment="libxcb-xv0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604567" comment="libxcb-xv0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153834" comment="libxcb-xv0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604568" comment="libxcb-xvmc0-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151898" comment="libxcb-xvmc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604569" comment="libxcb-xvmc0-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153835" comment="libxcb-xvmc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604570" comment="libxcb1-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151899" comment="libxcb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604571" comment="libxcb1-32bit-1.13-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151900" comment="libxcb1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14345</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181067">SUSE bug 1181067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604995" comment="xorg-x11-server-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604996" comment="xorg-x11-server-extra-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604997" comment="xorg-x11-server-sdk-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604998" comment="xorg-x11-server-source-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604999" comment="xorg-x11-server-wayland-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14346</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604995" comment="xorg-x11-server-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604996" comment="xorg-x11-server-extra-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604997" comment="xorg-x11-server-sdk-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604998" comment="xorg-x11-server-source-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604999" comment="xorg-x11-server-wayland-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14347</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604995" comment="xorg-x11-server-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604996" comment="xorg-x11-server-extra-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604997" comment="xorg-x11-server-sdk-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604998" comment="xorg-x11-server-source-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604999" comment="xorg-x11-server-wayland-1.20.3-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14349</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14349" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html" source="SUSE-SU"/>
    <description>
    It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176151">SUSE bug 1176151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179499">SUSE bug 1179499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604928" comment="libecpg6-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604929" comment="libpq5-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605036" comment="postgresql10-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605037" comment="postgresql10-contrib-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605038" comment="postgresql10-devel-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605039" comment="postgresql10-docs-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605040" comment="postgresql10-plperl-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605041" comment="postgresql10-plpython-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605042" comment="postgresql10-pltcl-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605043" comment="postgresql10-server-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605044" comment="postgresql10-test-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604930" comment="postgresql12-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604931" comment="postgresql12-contrib-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604932" comment="postgresql12-devel-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604933" comment="postgresql12-docs-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604934" comment="postgresql12-llvmjit-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604935" comment="postgresql12-plperl-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604936" comment="postgresql12-plpython-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604937" comment="postgresql12-pltcl-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604938" comment="postgresql12-server-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604939" comment="postgresql12-server-devel-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604940" comment="postgresql12-test-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14350</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14350" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html" source="SUSE-SU"/>
    <description>
    It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176151">SUSE bug 1176151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179115">SUSE bug 1179115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179499">SUSE bug 1179499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604928" comment="libecpg6-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604929" comment="libpq5-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604862" comment="postgresql-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604863" comment="postgresql-contrib-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604864" comment="postgresql-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604865" comment="postgresql-docs-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604866" comment="postgresql-llvmjit-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604867" comment="postgresql-plperl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604868" comment="postgresql-plpython-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604869" comment="postgresql-pltcl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604870" comment="postgresql-server-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604871" comment="postgresql-server-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604872" comment="postgresql-test-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605036" comment="postgresql10-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605037" comment="postgresql10-contrib-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605038" comment="postgresql10-devel-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605039" comment="postgresql10-docs-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605040" comment="postgresql10-plperl-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605041" comment="postgresql10-plpython-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605042" comment="postgresql10-pltcl-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605043" comment="postgresql10-server-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605044" comment="postgresql10-test-10.14-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604930" comment="postgresql12-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604931" comment="postgresql12-contrib-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604932" comment="postgresql12-devel-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604933" comment="postgresql12-docs-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604934" comment="postgresql12-llvmjit-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604935" comment="postgresql12-plperl-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604936" comment="postgresql12-plpython-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604937" comment="postgresql12-pltcl-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604938" comment="postgresql12-server-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604939" comment="postgresql12-server-devel-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604940" comment="postgresql12-test-12.4-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604893" comment="postgresql96-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161265" comment="postgresql96 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604894" comment="postgresql96-contrib-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161266" comment="postgresql96-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604895" comment="postgresql96-devel-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161267" comment="postgresql96-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604896" comment="postgresql96-docs-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161268" comment="postgresql96-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604897" comment="postgresql96-plperl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163501" comment="postgresql96-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604898" comment="postgresql96-plpython-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163503" comment="postgresql96-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604899" comment="postgresql96-pltcl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163505" comment="postgresql96-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604900" comment="postgresql96-server-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161269" comment="postgresql96-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604901" comment="postgresql96-test-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163508" comment="postgresql96-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14351</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14351" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606106" comment="kernel-debug-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606107" comment="kernel-debug-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606108" comment="kernel-debug-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606109" comment="kernel-default-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606110" comment="kernel-default-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606111" comment="kernel-default-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606112" comment="kernel-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606113" comment="kernel-docs-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606114" comment="kernel-docs-html-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606115" comment="kernel-kvmsmall-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606116" comment="kernel-kvmsmall-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606117" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606118" comment="kernel-macros-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606119" comment="kernel-obs-build-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606120" comment="kernel-obs-qa-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606121" comment="kernel-source-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606122" comment="kernel-source-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606123" comment="kernel-syms-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606124" comment="kernel-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606125" comment="kernel-vanilla-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606126" comment="kernel-vanilla-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14356</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14356" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176392">SUSE bug 1176392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605046" comment="kernel-debug-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605047" comment="kernel-debug-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605048" comment="kernel-debug-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605049" comment="kernel-default-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605050" comment="kernel-default-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605051" comment="kernel-default-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605052" comment="kernel-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605053" comment="kernel-docs-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605054" comment="kernel-docs-html-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605055" comment="kernel-kvmsmall-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605056" comment="kernel-kvmsmall-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605057" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605058" comment="kernel-macros-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605059" comment="kernel-obs-build-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605060" comment="kernel-obs-qa-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605061" comment="kernel-source-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605062" comment="kernel-source-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605063" comment="kernel-syms-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605064" comment="kernel-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605065" comment="kernel-vanilla-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605066" comment="kernel-vanilla-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14360</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4SY5GPVDDNTXYVZ6YALLHT7B5RVDBJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJUVPABDGLSKQJMNPJUJBYOQTIDGD67K/" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606650" comment="xorg-x11-server-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606651" comment="xorg-x11-server-extra-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606652" comment="xorg-x11-server-sdk-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606653" comment="xorg-x11-server-source-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606654" comment="xorg-x11-server-wayland-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14361</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00014.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605150" comment="xorg-x11-server-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605151" comment="xorg-x11-server-extra-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605152" comment="xorg-x11-server-sdk-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605153" comment="xorg-x11-server-source-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605154" comment="xorg-x11-server-wayland-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14362</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00014.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605150" comment="xorg-x11-server-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605151" comment="xorg-x11-server-extra-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605152" comment="xorg-x11-server-sdk-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605153" comment="xorg-x11-server-source-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605154" comment="xorg-x11-server-wayland-1.20.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14363</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00018.html" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605143" comment="libX11-6-1.6.5-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605144" comment="libX11-6-32bit-1.6.5-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151818" comment="libX11-6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605145" comment="libX11-data-1.6.5-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605146" comment="libX11-devel-1.6.5-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151820" comment="libX11-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605147" comment="libX11-devel-32bit-1.6.5-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153719" comment="libX11-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605148" comment="libX11-xcb1-1.6.5-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605149" comment="libX11-xcb1-32bit-1.6.5-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151822" comment="libX11-xcb1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14370</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4AHS44MM5VJQEFYSAEM4XLRKSPLU53H7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WEYG3UZ6PAJGRLA4U75IIT2HGWDPPZWR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container will get leaked into subsequent containers. An attacker who has control over the subsequent containers could use this flaw to gain access to sensitive information stored in such variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370</cve>
	<bugzilla href="https://bugzilla.suse.com/1176804">SUSE bug 1176804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606326" comment="podman-2.1.1-lp151.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606327" comment="podman-cni-config-2.1.1-lp151.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14374</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14374" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14374" ref_url="https://www.suse.com/security/cve/CVE-2020-14374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A flawed bounds checking in the copy_data function leads to a buffer overflow allowing an attacker in a virtual machine to write arbitrary data to any address in the vhost_crypto application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14374/">CVE-2020-14374</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605486" comment="dpdk-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605487" comment="dpdk-devel-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605488" comment="dpdk-doc-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605489" comment="dpdk-examples-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605490" comment="dpdk-kmp-default-18.11.9_k4.12.14_lp151.28.67-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605491" comment="dpdk-tools-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605492" comment="libdpdk-18_11-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14375</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14375" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14375" ref_url="https://www.suse.com/security/cve/CVE-2020-14375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14375/">CVE-2020-14375</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605486" comment="dpdk-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605487" comment="dpdk-devel-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605488" comment="dpdk-doc-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605489" comment="dpdk-examples-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605490" comment="dpdk-kmp-default-18.11.9_k4.12.14_lp151.28.67-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605491" comment="dpdk-tools-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605492" comment="libdpdk-18_11-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14376</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14376" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14376" ref_url="https://www.suse.com/security/cve/CVE-2020-14376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14376/">CVE-2020-14376</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605486" comment="dpdk-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605487" comment="dpdk-devel-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605488" comment="dpdk-doc-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605489" comment="dpdk-examples-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605490" comment="dpdk-kmp-default-18.11.9_k4.12.14_lp151.28.67-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605491" comment="dpdk-tools-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605492" comment="libdpdk-18_11-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14377</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14377" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14377" ref_url="https://www.suse.com/security/cve/CVE-2020-14377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14377/">CVE-2020-14377</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605486" comment="dpdk-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605487" comment="dpdk-devel-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605488" comment="dpdk-doc-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605489" comment="dpdk-examples-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605490" comment="dpdk-kmp-default-18.11.9_k4.12.14_lp151.28.67-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605491" comment="dpdk-tools-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605492" comment="libdpdk-18_11-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14378</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14378" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14378" ref_url="https://www.suse.com/security/cve/CVE-2020-14378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html" source="SUSE-SU"/>
    <description>
    An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14378/">CVE-2020-14378</cve>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605486" comment="dpdk-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605487" comment="dpdk-devel-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605488" comment="dpdk-doc-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605489" comment="dpdk-examples-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605490" comment="dpdk-kmp-default-18.11.9_k4.12.14_lp151.28.67-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173359" comment="dpdk-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605491" comment="dpdk-tools-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605492" comment="libdpdk-18_11-18.11.9-lp151.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283682" comment="libdpdk-18_11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14381</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14381" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14383</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383</cve>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605884" comment="ctdb-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605885" comment="ctdb-pcp-pmda-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605886" comment="ctdb-tests-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605887" comment="libdcerpc-binding0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605888" comment="libdcerpc-binding0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605889" comment="libdcerpc-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605890" comment="libdcerpc-samr-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605891" comment="libdcerpc-samr0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605892" comment="libdcerpc-samr0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605893" comment="libdcerpc0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605894" comment="libdcerpc0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605895" comment="libndr-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605896" comment="libndr-krb5pac-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605897" comment="libndr-krb5pac0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605898" comment="libndr-krb5pac0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605899" comment="libndr-nbt-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605900" comment="libndr-nbt0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605901" comment="libndr-nbt0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605902" comment="libndr-standard-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605903" comment="libndr-standard0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605904" comment="libndr-standard0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605905" comment="libndr0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605906" comment="libndr0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605907" comment="libnetapi-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605908" comment="libnetapi-devel-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605909" comment="libnetapi0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605910" comment="libnetapi0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605911" comment="libsamba-credentials-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605912" comment="libsamba-credentials0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605913" comment="libsamba-credentials0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605914" comment="libsamba-errors-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605915" comment="libsamba-errors0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605916" comment="libsamba-errors0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605917" comment="libsamba-hostconfig-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605918" comment="libsamba-hostconfig0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605919" comment="libsamba-hostconfig0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605920" comment="libsamba-passdb-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605921" comment="libsamba-passdb0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605922" comment="libsamba-passdb0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605923" comment="libsamba-policy-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605924" comment="libsamba-policy-python-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605925" comment="libsamba-policy-python3-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605926" comment="libsamba-policy0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605927" comment="libsamba-policy0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605928" comment="libsamba-policy0-python3-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605929" comment="libsamba-policy0-python3-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605930" comment="libsamba-util-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605931" comment="libsamba-util0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605932" comment="libsamba-util0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605933" comment="libsamdb-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605934" comment="libsamdb0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605935" comment="libsamdb0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605936" comment="libsmbclient-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605937" comment="libsmbclient0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605938" comment="libsmbclient0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605939" comment="libsmbconf-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605940" comment="libsmbconf0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605941" comment="libsmbconf0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605942" comment="libsmbldap-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605943" comment="libsmbldap2-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605944" comment="libsmbldap2-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605945" comment="libtevent-util-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605946" comment="libtevent-util0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605947" comment="libtevent-util0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605948" comment="libwbclient-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605949" comment="libwbclient0-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605950" comment="libwbclient0-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605951" comment="samba-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605952" comment="samba-ad-dc-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605953" comment="samba-ad-dc-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605954" comment="samba-ceph-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605955" comment="samba-client-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605956" comment="samba-client-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605957" comment="samba-core-devel-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605958" comment="samba-doc-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605959" comment="samba-dsdb-modules-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605960" comment="samba-libs-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605961" comment="samba-libs-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605962" comment="samba-libs-python-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605963" comment="samba-libs-python-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605964" comment="samba-libs-python3-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605965" comment="samba-libs-python3-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605966" comment="samba-pidl-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605967" comment="samba-python-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605968" comment="samba-python3-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605969" comment="samba-test-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605970" comment="samba-winbind-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605971" comment="samba-winbind-32bit-4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14386</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14390</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14392</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14392" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00218.html" source="SUSE-SU"/>
    <description>
    An untrusted pointer dereference flaw was found in Perl-DBI &lt; 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605292" comment="perl-DBI-1.639-lp151.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14393</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00218.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was found in perl-DBI &lt; 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605292" comment="perl-DBI-1.639-lp151.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009293432" comment="perl-DBI is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14397</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14398</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14398" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14399</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14399" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly "no trust boundary crossed."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14400</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14400" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14401</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14402</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/corre.c allows out-of-bounds access via encodings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609339" comment="LibVNCServer-devel-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609340" comment="libvncclient0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609341" comment="libvncserver0-0.9.10-lp151.7.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14416</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.4.16, a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14422</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606883" comment="libpython3_6m1_0-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606884" comment="libpython3_6m1_0-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609342" comment="python-ipaddress-1.0.18-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287509" comment="python-ipaddress is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606885" comment="python3-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606886" comment="python3-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606887" comment="python3-base-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606888" comment="python3-base-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606889" comment="python3-curses-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606890" comment="python3-dbm-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606891" comment="python3-devel-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606892" comment="python3-doc-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606893" comment="python3-doc-devhelp-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606894" comment="python3-idle-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606895" comment="python3-testsuite-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606896" comment="python3-tk-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606897" comment="python3-tools-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604582" comment="java-11-openjdk-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604583" comment="java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604584" comment="java-11-openjdk-demo-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604585" comment="java-11-openjdk-devel-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604586" comment="java-11-openjdk-headless-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604587" comment="java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604588" comment="java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604589" comment="java-11-openjdk-src-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604582" comment="java-11-openjdk-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604583" comment="java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604584" comment="java-11-openjdk-demo-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604585" comment="java-11-openjdk-devel-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604586" comment="java-11-openjdk-headless-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604587" comment="java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604588" comment="java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604589" comment="java-11-openjdk-src-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14573</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604582" comment="java-11-openjdk-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604583" comment="java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604584" comment="java-11-openjdk-demo-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604585" comment="java-11-openjdk-devel-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604586" comment="java-11-openjdk-headless-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604587" comment="java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604588" comment="java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604589" comment="java-11-openjdk-src-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14577</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604582" comment="java-11-openjdk-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604583" comment="java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604584" comment="java-11-openjdk-demo-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604585" comment="java-11-openjdk-devel-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604586" comment="java-11-openjdk-headless-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604587" comment="java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604588" comment="java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604589" comment="java-11-openjdk-src-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14578</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14579</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14581</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604582" comment="java-11-openjdk-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604583" comment="java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604584" comment="java-11-openjdk-demo-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604585" comment="java-11-openjdk-devel-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604586" comment="java-11-openjdk-headless-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604587" comment="java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604588" comment="java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604589" comment="java-11-openjdk-src-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14583</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604582" comment="java-11-openjdk-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604583" comment="java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604584" comment="java-11-openjdk-demo-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604585" comment="java-11-openjdk-devel-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604586" comment="java-11-openjdk-headless-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604587" comment="java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604588" comment="java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604589" comment="java-11-openjdk-src-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14593</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604582" comment="java-11-openjdk-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604583" comment="java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604584" comment="java-11-openjdk-demo-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604585" comment="java-11-openjdk-devel-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604586" comment="java-11-openjdk-headless-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604587" comment="java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604588" comment="java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604589" comment="java-11-openjdk-src-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14621</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604582" comment="java-11-openjdk-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604583" comment="java-11-openjdk-accessibility-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604584" comment="java-11-openjdk-demo-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604585" comment="java-11-openjdk-devel-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604586" comment="java-11-openjdk-headless-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604587" comment="java-11-openjdk-javadoc-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604588" comment="java-11-openjdk-jmods-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604589" comment="java-11-openjdk-src-11.0.8.0-lp151.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14628</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14628" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14628" ref_url="https://www.suse.com/security/cve/CVE-2020-14628" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: The CVE-2020-14628 is applicable to Windows VM only. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14628/">CVE-2020-14628</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14629</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14629" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14629" ref_url="https://www.suse.com/security/cve/CVE-2020-14629" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14629/">CVE-2020-14629</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14646</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14646" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14646" ref_url="https://www.suse.com/security/cve/CVE-2020-14646" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14646/">CVE-2020-14646</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14647</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14647" ref_url="https://www.suse.com/security/cve/CVE-2020-14647" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14647/">CVE-2020-14647</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14648</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14648" ref_url="https://www.suse.com/security/cve/CVE-2020-14648" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14648/">CVE-2020-14648</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14649</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14649" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14649" ref_url="https://www.suse.com/security/cve/CVE-2020-14649" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14649/">CVE-2020-14649</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14650</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14650" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14650" ref_url="https://www.suse.com/security/cve/CVE-2020-14650" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14650/">CVE-2020-14650</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14673" ref_url="https://www.suse.com/security/cve/CVE-2020-14673" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14673/">CVE-2020-14673</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14674" ref_url="https://www.suse.com/security/cve/CVE-2020-14674" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14674/">CVE-2020-14674</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14675</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14675" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14675" ref_url="https://www.suse.com/security/cve/CVE-2020-14675" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14675/">CVE-2020-14675</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14676" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14676" ref_url="https://www.suse.com/security/cve/CVE-2020-14676" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14676/">CVE-2020-14676</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14677</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14677" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14677" ref_url="https://www.suse.com/security/cve/CVE-2020-14677" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14677/">CVE-2020-14677</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14694</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14694" ref_url="https://www.suse.com/security/cve/CVE-2020-14694" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14694/">CVE-2020-14694</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14695" ref_url="https://www.suse.com/security/cve/CVE-2020-14695" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14695/">CVE-2020-14695</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14698</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14698" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14698" ref_url="https://www.suse.com/security/cve/CVE-2020-14698" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14698/">CVE-2020-14698</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14699</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14699" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14699" ref_url="https://www.suse.com/security/cve/CVE-2020-14699" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14699/">CVE-2020-14699</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14700</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14700" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14700" ref_url="https://www.suse.com/security/cve/CVE-2020-14700" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14700/">CVE-2020-14700</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14703</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14703" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14703" ref_url="https://www.suse.com/security/cve/CVE-2020-14703" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14703/">CVE-2020-14703</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14704" ref_url="https://www.suse.com/security/cve/CVE-2020-14704" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14704/">CVE-2020-14704</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14707" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14707" ref_url="https://www.suse.com/security/cve/CVE-2020-14707" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14707/">CVE-2020-14707</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14711</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14711" ref_url="https://www.suse.com/security/cve/CVE-2020-14711" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: The CVE-2020-14711 is applicable to macOS host only. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14711/">CVE-2020-14711</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14712</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14712" ref_url="https://www.suse.com/security/cve/CVE-2020-14712" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14712/">CVE-2020-14712</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14713</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14713" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14713" ref_url="https://www.suse.com/security/cve/CVE-2020-14713" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14713/">CVE-2020-14713</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14714</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14714" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14714" ref_url="https://www.suse.com/security/cve/CVE-2020-14714" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14714/">CVE-2020-14714</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14715</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14715" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14715" ref_url="https://www.suse.com/security/cve/CVE-2020-14715" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14715/">CVE-2020-14715</cve>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605293" comment="python3-virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605294" comment="virtualbox-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605295" comment="virtualbox-devel-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605296" comment="virtualbox-guest-desktop-icons-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605297" comment="virtualbox-guest-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605298" comment="virtualbox-guest-tools-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605299" comment="virtualbox-guest-x11-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605300" comment="virtualbox-host-source-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605301" comment="virtualbox-kmp-default-6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605302" comment="virtualbox-qt-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605303" comment="virtualbox-vnc-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605304" comment="virtualbox-websrv-6.0.24-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1472</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472" source="SUSE CVE"/>
		<reference ref_id="BLOG-ZEROLOGON" ref_url="https://www.suse.com/c/suse-addresses-zerologon-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007469.html" source="SUSE-SU"/>
		<reference ref_id="TID000019713" ref_url="https://www.suse.com/support/kb/doc/?id=000019713" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605305" comment="ctdb-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605306" comment="ctdb-pcp-pmda-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605307" comment="ctdb-tests-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152998" comment="ctdb-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605308" comment="libdcerpc-binding0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151262" comment="libdcerpc-binding0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605309" comment="libdcerpc-binding0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151263" comment="libdcerpc-binding0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605310" comment="libdcerpc-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152727" comment="libdcerpc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605311" comment="libdcerpc-samr-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152728" comment="libdcerpc-samr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605312" comment="libdcerpc-samr0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152729" comment="libdcerpc-samr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605313" comment="libdcerpc-samr0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152730" comment="libdcerpc-samr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605314" comment="libdcerpc0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151264" comment="libdcerpc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605315" comment="libdcerpc0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151265" comment="libdcerpc0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605316" comment="libndr-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152735" comment="libndr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605317" comment="libndr-krb5pac-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152736" comment="libndr-krb5pac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605318" comment="libndr-krb5pac0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151268" comment="libndr-krb5pac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605319" comment="libndr-krb5pac0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151269" comment="libndr-krb5pac0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605320" comment="libndr-nbt-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152737" comment="libndr-nbt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605321" comment="libndr-nbt0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151270" comment="libndr-nbt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605322" comment="libndr-nbt0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151271" comment="libndr-nbt0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605323" comment="libndr-standard-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152738" comment="libndr-standard-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605324" comment="libndr-standard0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151272" comment="libndr-standard0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605325" comment="libndr-standard0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151273" comment="libndr-standard0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605326" comment="libndr0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151274" comment="libndr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605327" comment="libndr0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151275" comment="libndr0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605328" comment="libnetapi-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152739" comment="libnetapi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605329" comment="libnetapi-devel-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287505" comment="libnetapi-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605330" comment="libnetapi0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151276" comment="libnetapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605331" comment="libnetapi0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151277" comment="libnetapi0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605332" comment="libsamba-credentials-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152742" comment="libsamba-credentials-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605333" comment="libsamba-credentials0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151279" comment="libsamba-credentials0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605334" comment="libsamba-credentials0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151280" comment="libsamba-credentials0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605335" comment="libsamba-errors-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154222" comment="libsamba-errors-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605336" comment="libsamba-errors0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154085" comment="libsamba-errors0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605337" comment="libsamba-errors0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154086" comment="libsamba-errors0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605338" comment="libsamba-hostconfig-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152743" comment="libsamba-hostconfig-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605339" comment="libsamba-hostconfig0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151281" comment="libsamba-hostconfig0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605340" comment="libsamba-hostconfig0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151282" comment="libsamba-hostconfig0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605341" comment="libsamba-passdb-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152744" comment="libsamba-passdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605342" comment="libsamba-passdb0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151283" comment="libsamba-passdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605343" comment="libsamba-passdb0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151284" comment="libsamba-passdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605344" comment="libsamba-policy-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152745" comment="libsamba-policy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605345" comment="libsamba-policy-python-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266817" comment="libsamba-policy-python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605346" comment="libsamba-policy-python3-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266818" comment="libsamba-policy-python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605347" comment="libsamba-policy0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152746" comment="libsamba-policy0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605348" comment="libsamba-policy0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152747" comment="libsamba-policy0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605349" comment="libsamba-policy0-python3-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266819" comment="libsamba-policy0-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605350" comment="libsamba-policy0-python3-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266820" comment="libsamba-policy0-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605351" comment="libsamba-util-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152748" comment="libsamba-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605352" comment="libsamba-util0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151285" comment="libsamba-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605353" comment="libsamba-util0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151286" comment="libsamba-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605354" comment="libsamdb-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152749" comment="libsamdb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605355" comment="libsamdb0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151287" comment="libsamdb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605356" comment="libsamdb0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151288" comment="libsamdb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605357" comment="libsmbclient-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151289" comment="libsmbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605358" comment="libsmbclient0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151292" comment="libsmbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605359" comment="libsmbclient0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152751" comment="libsmbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605360" comment="libsmbconf-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152752" comment="libsmbconf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605361" comment="libsmbconf0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151293" comment="libsmbconf0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605362" comment="libsmbconf0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151294" comment="libsmbconf0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605363" comment="libsmbldap-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152753" comment="libsmbldap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605364" comment="libsmbldap2-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177162" comment="libsmbldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605365" comment="libsmbldap2-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233090" comment="libsmbldap2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605366" comment="libtevent-util-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152761" comment="libtevent-util-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605367" comment="libtevent-util0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151297" comment="libtevent-util0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605368" comment="libtevent-util0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151298" comment="libtevent-util0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605369" comment="libwbclient-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152764" comment="libwbclient-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605370" comment="libwbclient0-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151299" comment="libwbclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605371" comment="libwbclient0-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151300" comment="libwbclient0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605372" comment="samba-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605373" comment="samba-ad-dc-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605374" comment="samba-ad-dc-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266822" comment="samba-ad-dc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605375" comment="samba-ceph-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605376" comment="samba-client-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605377" comment="samba-client-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151304" comment="samba-client-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605378" comment="samba-core-devel-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152775" comment="samba-core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605379" comment="samba-doc-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605380" comment="samba-dsdb-modules-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605381" comment="samba-libs-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605382" comment="samba-libs-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151307" comment="samba-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605383" comment="samba-libs-python-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266823" comment="samba-libs-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605384" comment="samba-libs-python-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266824" comment="samba-libs-python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605385" comment="samba-libs-python3-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605386" comment="samba-libs-python3-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266826" comment="samba-libs-python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605387" comment="samba-pidl-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152776" comment="samba-pidl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605388" comment="samba-python-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152777" comment="samba-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605389" comment="samba-python3-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605390" comment="samba-test-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605391" comment="samba-winbind-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605392" comment="samba-winbind-32bit-4.9.5+git.373.26895a83dbf-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151309" comment="samba-winbind-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606625" comment="libmariadb-devel-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606626" comment="libmariadb3-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606627" comment="libmariadb3-32bit-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606628" comment="libmariadb_plugins-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606629" comment="libmariadbprivate-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606630" comment="libmysqld-devel-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606631" comment="libmysqld19-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606632" comment="mariadb-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606633" comment="mariadb-bench-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606634" comment="mariadb-client-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606635" comment="mariadb-errormessages-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606636" comment="mariadb-galera-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606637" comment="mariadb-test-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606638" comment="mariadb-tools-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14776</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606625" comment="libmariadb-devel-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606626" comment="libmariadb3-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606627" comment="libmariadb3-32bit-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606628" comment="libmariadb_plugins-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606629" comment="libmariadbprivate-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606630" comment="libmysqld-devel-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606631" comment="libmysqld19-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606632" comment="mariadb-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606633" comment="mariadb-bench-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606634" comment="mariadb-client-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606635" comment="mariadb-errormessages-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606636" comment="mariadb-galera-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606637" comment="mariadb-test-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606638" comment="mariadb-tools-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14779</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606205" comment="java-11-openjdk-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606206" comment="java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606207" comment="java-11-openjdk-demo-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606208" comment="java-11-openjdk-devel-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606209" comment="java-11-openjdk-headless-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606210" comment="java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606211" comment="java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606212" comment="java-11-openjdk-src-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606205" comment="java-11-openjdk-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606206" comment="java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606207" comment="java-11-openjdk-demo-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606208" comment="java-11-openjdk-devel-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606209" comment="java-11-openjdk-headless-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606210" comment="java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606211" comment="java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606212" comment="java-11-openjdk-src-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14782</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606205" comment="java-11-openjdk-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606206" comment="java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606207" comment="java-11-openjdk-demo-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606208" comment="java-11-openjdk-devel-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606209" comment="java-11-openjdk-headless-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606210" comment="java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606211" comment="java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606212" comment="java-11-openjdk-src-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14789</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606625" comment="libmariadb-devel-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606626" comment="libmariadb3-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606627" comment="libmariadb3-32bit-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606628" comment="libmariadb_plugins-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606629" comment="libmariadbprivate-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606630" comment="libmysqld-devel-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606631" comment="libmysqld19-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606632" comment="mariadb-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606633" comment="mariadb-bench-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606634" comment="mariadb-client-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606635" comment="mariadb-errormessages-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606636" comment="mariadb-galera-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606637" comment="mariadb-test-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606638" comment="mariadb-tools-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14792</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606205" comment="java-11-openjdk-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606206" comment="java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606207" comment="java-11-openjdk-demo-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606208" comment="java-11-openjdk-devel-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606209" comment="java-11-openjdk-headless-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606210" comment="java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606211" comment="java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606212" comment="java-11-openjdk-src-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14796</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606205" comment="java-11-openjdk-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606206" comment="java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606207" comment="java-11-openjdk-demo-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606208" comment="java-11-openjdk-devel-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606209" comment="java-11-openjdk-headless-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606210" comment="java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606211" comment="java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606212" comment="java-11-openjdk-src-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606205" comment="java-11-openjdk-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606206" comment="java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606207" comment="java-11-openjdk-demo-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606208" comment="java-11-openjdk-devel-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606209" comment="java-11-openjdk-headless-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606210" comment="java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606211" comment="java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606212" comment="java-11-openjdk-src-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14798</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606205" comment="java-11-openjdk-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606206" comment="java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606207" comment="java-11-openjdk-demo-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606208" comment="java-11-openjdk-devel-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606209" comment="java-11-openjdk-headless-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606210" comment="java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606211" comment="java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606212" comment="java-11-openjdk-src-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008363.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IE6Q2IB2YXUXIWFBPF2P2FIHVNJLBUPC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606205" comment="java-11-openjdk-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606206" comment="java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606207" comment="java-11-openjdk-demo-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606208" comment="java-11-openjdk-devel-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606209" comment="java-11-openjdk-headless-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606210" comment="java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606211" comment="java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606212" comment="java-11-openjdk-src-11.0.9.0-lp151.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606339" comment="java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606340" comment="java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606341" comment="java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606342" comment="java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606343" comment="java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606344" comment="java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606345" comment="java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606625" comment="libmariadb-devel-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606626" comment="libmariadb3-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606627" comment="libmariadb3-32bit-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606628" comment="libmariadb_plugins-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606629" comment="libmariadbprivate-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606630" comment="libmysqld-devel-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606631" comment="libmysqld19-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606632" comment="mariadb-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606633" comment="mariadb-bench-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606634" comment="mariadb-client-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606635" comment="mariadb-errormessages-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606636" comment="mariadb-galera-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606637" comment="mariadb-test-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606638" comment="mariadb-tools-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14954</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14954" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609115" comment="mutt-1.10.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609116" comment="mutt-doc-1.10.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609117" comment="mutt-lang-1.10.1-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609858" comment="neomutt-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302848" comment="neomutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609859" comment="neomutt-doc-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302850" comment="neomutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609860" comment="neomutt-lang-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302852" comment="neomutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14983" ref_url="https://www.suse.com/security/cve/CVE-2020-14983" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0947-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00012.html" source="SUSE-SU"/>
    <description>
    The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-14983/">CVE-2020-14983</cve>
	<bugzilla href="https://bugzilla.suse.com/1173595">SUSE bug 1173595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609157" comment="chocolate-doom-3.0.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286911" comment="chocolate-doom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609158" comment="chocolate-doom-bash-completion-3.0.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286912" comment="chocolate-doom-bash-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15025</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15025" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609184" comment="ntp-4.2.8p15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151182" comment="ntp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609185" comment="ntp-doc-4.2.8p15-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151183" comment="ntp-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15049</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049" source="SUSE CVE"/>
		<reference ref_id="GHSA-qf3v-rc95-96j5" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-qf3v-rc95-96j5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-13"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174381">SUSE bug 1174381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605085" comment="squid-4.13-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15095</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15095" ref_url="https://www.suse.com/security/cve/CVE-2020-15095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1644-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html" source="SUSE-SU"/>
    <description>
    Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "&lt;protocol&gt;://[&lt;user&gt;[:&lt;password&gt;]@]&lt;hostname&gt;[:&lt;port&gt;][:][/]&lt;path&gt;". The password value is not redacted and is printed to stdout and also to any generated log files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15095/">CVE-2020-15095</cve>
	<bugzilla href="https://bugzilla.suse.com/1173937">SUSE bug 1173937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605504" comment="nodejs8-8.17.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605505" comment="nodejs8-devel-8.17.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605506" comment="nodejs8-docs-8.17.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605507" comment="npm8-8.17.0-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15103</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15103" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15103" ref_url="https://www.suse.com/security/cve/CVE-2020-15103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00010.html" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15103/">CVE-2020-15103</cve>
	<bugzilla href="https://bugzilla.suse.com/1174321">SUSE bug 1174321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605067" comment="freerdp-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605068" comment="freerdp-devel-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605069" comment="freerdp-proxy-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605070" comment="freerdp-server-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605071" comment="freerdp-wayland-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605072" comment="libfreerdp2-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605073" comment="libuwac0-0-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605074" comment="libwinpr2-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605075" comment="uwac0-0-devel-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605076" comment="winpr2-devel-2.1.2-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15166</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15166" ref_url="https://www.suse.com/security/cve/CVE-2020-15166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007741.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFPGMWNYFF7TPILP2K22BE5SUUBZBMNS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1910-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PNPGMJDNXG4YN2UCUL54ZUIYNPJTE25F/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15166/">CVE-2020-15166</cve>
	<bugzilla href="https://bugzilla.suse.com/1176116">SUSE bug 1176116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606127" comment="libunwind-1.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177215" comment="libunwind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606128" comment="libunwind-32bit-1.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243091" comment="libunwind-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606129" comment="libunwind-devel-1.2.1-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243092" comment="libunwind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606130" comment="libzmq5-4.2.3-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243098" comment="libzmq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606131" comment="zeromq-devel-4.2.3-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243101" comment="zeromq-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606132" comment="zeromq-tools-4.2.3-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243102" comment="zeromq-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15169</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15169" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15169" ref_url="https://www.suse.com/security/cve/CVE-2020-15169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15169/">CVE-2020-15169</cve>
	<bugzilla href="https://bugzilla.suse.com/1176421">SUSE bug 1176421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15180</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180</cve>
	<bugzilla href="https://bugzilla.suse.com/1177472">SUSE bug 1177472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606625" comment="libmariadb-devel-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261765" comment="libmariadb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606626" comment="libmariadb3-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261766" comment="libmariadb3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606627" comment="libmariadb3-32bit-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261767" comment="libmariadb3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606628" comment="libmariadb_plugins-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261768" comment="libmariadb_plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606629" comment="libmariadbprivate-3.1.11-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261769" comment="libmariadbprivate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606630" comment="libmysqld-devel-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606631" comment="libmysqld19-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606632" comment="mariadb-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606633" comment="mariadb-bench-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606634" comment="mariadb-client-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606635" comment="mariadb-errormessages-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606636" comment="mariadb-galera-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606637" comment="mariadb-test-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606638" comment="mariadb-tools-10.2.36-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15229</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15229" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15229" ref_url="https://www.suse.com/security/cve/CVE-2020-15229" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1769-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-10/msg00192.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html" source="SUSE-SU"/>
    <description>
    Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user. There is no solid workaround except to temporary avoid to use unprivileged mode with single file images in favor of sandbox images instead. Regarding image build, temporary avoid to build from `library` and `shub` sources and as much as possible use `--fakeroot` or a VM for that.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15229/">CVE-2020-15229</cve>
	<bugzilla href="https://bugzilla.suse.com/1177901">SUSE bug 1177901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605803" comment="singularity-3.6.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15304</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15304" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15304" ref_url="https://www.suse.com/security/cve/CVE-2020-15304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.5.2. An invalid tiled input file could cause invalid memory access in TiledInputFile::TiledInputFile() in IlmImf/ImfTiledInputFile.cpp, as demonstrated by a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15304/">CVE-2020-15304</cve>
	<bugzilla href="https://bugzilla.suse.com/1173466">SUSE bug 1173466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609243" comment="libIlmImf-2_2-23-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609244" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609245" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609246" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609247" comment="openexr-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609248" comment="openexr-devel-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609249" comment="openexr-doc-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15305</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15305" ref_url="https://www.suse.com/security/cve/CVE-2020-15305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.5.2. Invalid input could cause a use-after-free in DeepScanLineInputFile::DeepScanLineInputFile() in IlmImf/ImfDeepScanLineInputFile.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15305/">CVE-2020-15305</cve>
	<bugzilla href="https://bugzilla.suse.com/1173467">SUSE bug 1173467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609243" comment="libIlmImf-2_2-23-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609244" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609245" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609246" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609247" comment="openexr-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609248" comment="openexr-devel-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609249" comment="openexr-doc-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15306</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15306" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15306" ref_url="https://www.suse.com/security/cve/CVE-2020-15306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before v2.5.2. Invalid chunkCount attributes could cause a heap buffer overflow in getChunkOffsetTableSize() in IlmImf/ImfMisc.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15306/">CVE-2020-15306</cve>
	<bugzilla href="https://bugzilla.suse.com/1173469">SUSE bug 1173469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609243" comment="libIlmImf-2_2-23-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609244" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609245" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609246" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609247" comment="openexr-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609248" comment="openexr-devel-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609249" comment="openexr-doc-2.2.1-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15393</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15396</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15396" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15396" ref_url="https://www.suse.com/security/cve/CVE-2020-15396" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html" source="SUSE-SU"/>
    <description>
    In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15396/">CVE-2020-15396</cve>
	<bugzilla href="https://bugzilla.suse.com/1173521">SUSE bug 1173521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604627" comment="hylafax+-7.0.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235038" comment="hylafax+ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604628" comment="hylafax+-client-7.0.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235040" comment="hylafax+-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604629" comment="libfaxutil7_0_3-7.0.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289522" comment="libfaxutil7_0_3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15397</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15397" ref_url="https://www.suse.com/security/cve/CVE-2020-15397" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html" source="SUSE-SU"/>
    <description>
    HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15397/">CVE-2020-15397</cve>
	<bugzilla href="https://bugzilla.suse.com/1173519">SUSE bug 1173519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604627" comment="hylafax+-7.0.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235038" comment="hylafax+ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604628" comment="hylafax+-client-7.0.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235040" comment="hylafax+-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604629" comment="libfaxutil7_0_3-7.0.3-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289522" comment="libfaxutil7_0_3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15436</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15436" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606701" comment="kernel-debug-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606702" comment="kernel-debug-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606703" comment="kernel-debug-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606704" comment="kernel-default-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606705" comment="kernel-default-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606706" comment="kernel-default-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606707" comment="kernel-devel-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606708" comment="kernel-docs-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606709" comment="kernel-docs-html-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606710" comment="kernel-kvmsmall-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606711" comment="kernel-kvmsmall-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606712" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606713" comment="kernel-macros-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606714" comment="kernel-obs-build-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606715" comment="kernel-obs-qa-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606716" comment="kernel-source-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606717" comment="kernel-source-vanilla-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606718" comment="kernel-syms-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606719" comment="kernel-vanilla-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606720" comment="kernel-vanilla-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606721" comment="kernel-vanilla-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15437</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15437" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-&gt;serial_in pointer which uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606701" comment="kernel-debug-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606702" comment="kernel-debug-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606703" comment="kernel-debug-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606704" comment="kernel-default-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606705" comment="kernel-default-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606706" comment="kernel-default-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606707" comment="kernel-devel-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606708" comment="kernel-docs-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606709" comment="kernel-docs-html-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606710" comment="kernel-kvmsmall-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606711" comment="kernel-kvmsmall-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606712" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606713" comment="kernel-macros-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606714" comment="kernel-obs-build-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606715" comment="kernel-obs-qa-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606716" comment="kernel-source-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606717" comment="kernel-source-vanilla-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606718" comment="kernel-syms-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606719" comment="kernel-vanilla-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606720" comment="kernel-vanilla-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606721" comment="kernel-vanilla-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15466</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15466" ref_url="https://www.suse.com/security/cve/CVE-2020-15466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.4, the GVCP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gvcp.c by ensuring that an offset increases in all situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15466/">CVE-2020-15466</cve>
	<bugzilla href="https://bugzilla.suse.com/1173606">SUSE bug 1173606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604597" comment="libwireshark13-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604598" comment="libwiretap10-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604599" comment="libwsutil11-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604600" comment="wireshark-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604601" comment="wireshark-devel-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604602" comment="wireshark-ui-qt-3.2.5-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15503</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15503" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15503" ref_url="https://www.suse.com/security/cve/CVE-2020-15503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007173.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html" source="SUSE-SU"/>
    <description>
    LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15503/">CVE-2020-15503</cve>
	<bugzilla href="https://bugzilla.suse.com/1173674">SUSE bug 1173674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604422" comment="libraw-devel-0.18.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151901" comment="libraw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604423" comment="libraw-devel-static-0.18.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153172" comment="libraw-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604424" comment="libraw-tools-0.18.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153173" comment="libraw-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604425" comment="libraw16-0.18.9-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177187" comment="libraw16 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15562" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15562" ref_url="https://www.suse.com/security/cve/CVE-2020-15562" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15562/">CVE-2020-15562</cve>
	<bugzilla href="https://bugzilla.suse.com/1173792">SUSE bug 1173792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609735" comment="roundcubemail-1.3.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15563</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15563" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest's video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563</cve>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609233" comment="xen-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609234" comment="xen-devel-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609235" comment="xen-doc-html-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609236" comment="xen-libs-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609237" comment="xen-libs-32bit-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609238" comment="xen-tools-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609239" comment="xen-tools-domU-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15565</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15565" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen's free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609233" comment="xen-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609234" comment="xen-devel-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609235" comment="xen-doc-html-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609236" comment="xen-libs-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609237" comment="xen-libs-32bit-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609238" comment="xen-tools-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609239" comment="xen-tools-domU-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15566</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15566" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15566" ref_url="https://www.suse.com/security/cve/CVE-2020-15566" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15566/">CVE-2020-15566</cve>
	<bugzilla href="https://bugzilla.suse.com/1173376">SUSE bug 1173376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609233" comment="xen-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609234" comment="xen-devel-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609235" comment="xen-doc-html-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609236" comment="xen-libs-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609237" comment="xen-libs-32bit-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609238" comment="xen-tools-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609239" comment="xen-tools-domU-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15567</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15567" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609233" comment="xen-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609234" comment="xen-devel-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609235" comment="xen-doc-html-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609236" comment="xen-libs-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609237" comment="xen-libs-32bit-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609238" comment="xen-tools-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609239" comment="xen-tools-domU-4.12.3_04-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15572</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15572" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15572" ref_url="https://www.suse.com/security/cve/CVE-2020-15572" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LICIVWVPYBVUILMW5J4DEG6B67OGC45P/" source="SUSE-SU"/>
    <description>
    Tor before 0.4.3.6 has an out-of-bounds memory access that allows a remote denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS), aka TROVE-2020-001.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15572/">CVE-2020-15572</cve>
	<bugzilla href="https://bugzilla.suse.com/1173979">SUSE bug 1173979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609826" comment="tor-0.3.5.12-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153574" comment="tor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15586</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15586" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15586" ref_url="https://www.suse.com/security/cve/CVE-2020-15586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" source="SUSE-SU"/>
    <description>
    Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15586/">CVE-2020-15586</cve>
	<bugzilla href="https://bugzilla.suse.com/1174153">SUSE bug 1174153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604419" comment="go1.13-1.13.14-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287972" comment="go1.13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604420" comment="go1.13-doc-1.13.14-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287973" comment="go1.13-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604421" comment="go1.13-race-1.13.14-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287974" comment="go1.13-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605187" comment="go1.14-1.14.7-lp151.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605188" comment="go1.14-doc-1.14.7-lp151.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605189" comment="go1.14-race-1.14.7-lp151.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15652</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox &lt; 79, Firefox ESR &lt; 68.11, Firefox ESR &lt; 78.1, Thunderbird &lt; 68.11, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604594" comment="MozillaThunderbird-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604595" comment="MozillaThunderbird-translations-common-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604596" comment="MozillaThunderbird-translations-other-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15653</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15655</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15656</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15657</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15657" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    Firefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15658</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15658" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 79, Firefox ESR &lt; 68.11, Firefox ESR &lt; 78.1, Thunderbird &lt; 68.11, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604594" comment="MozillaThunderbird-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604595" comment="MozillaThunderbird-translations-common-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604596" comment="MozillaThunderbird-translations-other-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15663</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00026.html" source="SUSE-SU"/>
    <description>
    If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with system privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with System Privileges. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 80, Thunderbird &lt; 78.2, Thunderbird &lt; 68.12, Firefox ESR &lt; 68.12, and Firefox ESR &lt; 78.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605179" comment="MozillaFirefox-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605180" comment="MozillaFirefox-branding-upstream-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605181" comment="MozillaFirefox-buildsymbols-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605182" comment="MozillaFirefox-devel-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605183" comment="MozillaFirefox-translations-common-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605184" comment="MozillaFirefox-translations-other-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605176" comment="MozillaThunderbird-68.12.0-lp151.2.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605177" comment="MozillaThunderbird-translations-common-68.12.0-lp151.2.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605178" comment="MozillaThunderbird-translations-other-68.12.0-lp151.2.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15664</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00026.html" source="SUSE-SU"/>
    <description>
    By holding a reference to the eval() function from an about:blank window, a malicious webpage could have gained access to the InstallTrigger object which would allow them to prompt the user to install an extension. Combined with user confusion, this could result in an unintended or malicious extension being installed. This vulnerability affects Firefox &lt; 80, Thunderbird &lt; 78.2, Thunderbird &lt; 68.12, Firefox ESR &lt; 68.12, Firefox ESR &lt; 78.2, and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605179" comment="MozillaFirefox-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605180" comment="MozillaFirefox-branding-upstream-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605181" comment="MozillaFirefox-buildsymbols-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605182" comment="MozillaFirefox-devel-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605183" comment="MozillaFirefox-translations-common-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605184" comment="MozillaFirefox-translations-other-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605176" comment="MozillaThunderbird-68.12.0-lp151.2.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605177" comment="MozillaThunderbird-translations-common-68.12.0-lp151.2.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605178" comment="MozillaThunderbird-translations-other-68.12.0-lp151.2.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15669</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00026.html" source="SUSE-SU"/>
    <description>
    When aborting an operation, such as a fetch, an abort signal may be deleted while alerting the objects to be notified. This results in a use-after-free and we presume that with enough effort it could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.12 and Thunderbird &lt; 68.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605176" comment="MozillaThunderbird-68.12.0-lp151.2.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605177" comment="MozillaThunderbird-translations-common-68.12.0-lp151.2.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605178" comment="MozillaThunderbird-translations-other-68.12.0-lp151.2.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15670</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00027.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox for Android 79. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 80, Firefox ESR &lt; 78.2, Thunderbird &lt; 78.2, and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605179" comment="MozillaFirefox-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605180" comment="MozillaFirefox-branding-upstream-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605181" comment="MozillaFirefox-buildsymbols-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605182" comment="MozillaFirefox-devel-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605183" comment="MozillaFirefox-translations-common-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605184" comment="MozillaFirefox-translations-other-78.2.0-lp151.2.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605426" comment="MozillaFirefox-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605427" comment="MozillaFirefox-branding-upstream-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605428" comment="MozillaFirefox-buildsymbols-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605429" comment="MozillaFirefox-devel-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605430" comment="MozillaFirefox-translations-common-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605431" comment="MozillaFirefox-translations-other-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605839" comment="MozillaThunderbird-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605840" comment="MozillaThunderbird-translations-common-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605841" comment="MozillaThunderbird-translations-other-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605842" comment="mozilla-nspr-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605843" comment="mozilla-nspr-32bit-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605844" comment="mozilla-nspr-devel-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605426" comment="MozillaFirefox-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605427" comment="MozillaFirefox-branding-upstream-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605428" comment="MozillaFirefox-buildsymbols-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605429" comment="MozillaFirefox-devel-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605430" comment="MozillaFirefox-translations-common-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605431" comment="MozillaFirefox-translations-other-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605839" comment="MozillaThunderbird-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605840" comment="MozillaThunderbird-translations-common-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605841" comment="MozillaThunderbird-translations-other-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605842" comment="mozilla-nspr-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605843" comment="mozilla-nspr-32bit-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605844" comment="mozilla-nspr-devel-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15677</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605426" comment="MozillaFirefox-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605427" comment="MozillaFirefox-branding-upstream-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605428" comment="MozillaFirefox-buildsymbols-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605429" comment="MozillaFirefox-devel-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605430" comment="MozillaFirefox-translations-common-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605431" comment="MozillaFirefox-translations-other-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605839" comment="MozillaThunderbird-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605840" comment="MozillaThunderbird-translations-common-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605841" comment="MozillaThunderbird-translations-other-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605842" comment="mozilla-nspr-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605843" comment="mozilla-nspr-32bit-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605844" comment="mozilla-nspr-devel-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605426" comment="MozillaFirefox-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605427" comment="MozillaFirefox-branding-upstream-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605428" comment="MozillaFirefox-buildsymbols-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605429" comment="MozillaFirefox-devel-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605430" comment="MozillaFirefox-translations-common-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605431" comment="MozillaFirefox-translations-other-78.3.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605839" comment="MozillaThunderbird-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605840" comment="MozillaThunderbird-translations-common-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605841" comment="MozillaThunderbird-translations-other-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605842" comment="mozilla-nspr-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605843" comment="mozilla-nspr-32bit-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605844" comment="mozilla-nspr-devel-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15683</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.4, Firefox &lt; 82, and Thunderbird &lt; 78.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605709" comment="MozillaFirefox-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605710" comment="MozillaFirefox-branding-upstream-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605711" comment="MozillaFirefox-buildsymbols-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605712" comment="MozillaFirefox-devel-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605713" comment="MozillaFirefox-translations-common-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605714" comment="MozillaFirefox-translations-other-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605839" comment="MozillaThunderbird-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605840" comment="MozillaThunderbird-translations-common-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605841" comment="MozillaThunderbird-translations-other-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605842" comment="mozilla-nspr-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605843" comment="mozilla-nspr-32bit-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605844" comment="mozilla-nspr-devel-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15685</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15685" ref_url="https://www.suse.com/security/cve/CVE-2020-15685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15685/">CVE-2020-15685</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609475" comment="MozillaThunderbird-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609476" comment="MozillaThunderbird-translations-common-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609477" comment="MozillaThunderbird-translations-other-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15705" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html" source="SUSE-SU"/>
    <description>
    GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182890">SUSE bug 1182890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605000" comment="grub2-2.02-lp151.21.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605001" comment="grub2-branding-upstream-2.02-lp151.21.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605002" comment="grub2-i386-efi-2.02-lp151.21.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605003" comment="grub2-i386-pc-2.02-lp151.21.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605004" comment="grub2-i386-xen-2.02-lp151.21.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605005" comment="grub2-snapper-plugin-2.02-lp151.21.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605006" comment="grub2-systemd-sleep-plugin-2.02-lp151.21.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605007" comment="grub2-x86_64-efi-2.02-lp151.21.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605008" comment="grub2-x86_64-xen-2.02-lp151.21.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15706</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15706" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604572" comment="grub2-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604573" comment="grub2-branding-upstream-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604574" comment="grub2-i386-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604575" comment="grub2-i386-pc-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604576" comment="grub2-i386-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604577" comment="grub2-snapper-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604578" comment="grub2-systemd-sleep-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604579" comment="grub2-x86_64-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604580" comment="grub2-x86_64-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15707</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15707" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604572" comment="grub2-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604573" comment="grub2-branding-upstream-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604574" comment="grub2-i386-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153177" comment="grub2-i386-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604575" comment="grub2-i386-pc-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604576" comment="grub2-i386-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289024" comment="grub2-i386-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604577" comment="grub2-snapper-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604578" comment="grub2-systemd-sleep-plugin-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604579" comment="grub2-x86_64-efi-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604580" comment="grub2-x86_64-xen-2.02-lp151.21.21.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15708</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15708" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html" source="SUSE-SU"/>
    <description>
    Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605805" comment="libvirt-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605806" comment="libvirt-admin-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605807" comment="libvirt-bash-completion-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605808" comment="libvirt-client-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605809" comment="libvirt-daemon-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605810" comment="libvirt-daemon-config-network-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605811" comment="libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605812" comment="libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605813" comment="libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605814" comment="libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605815" comment="libvirt-daemon-driver-network-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605816" comment="libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605817" comment="libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605818" comment="libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605819" comment="libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605820" comment="libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605821" comment="libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605822" comment="libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605823" comment="libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605824" comment="libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605825" comment="libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605826" comment="libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605827" comment="libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605828" comment="libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605829" comment="libvirt-daemon-hooks-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605830" comment="libvirt-daemon-lxc-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605831" comment="libvirt-daemon-qemu-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605832" comment="libvirt-daemon-xen-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605833" comment="libvirt-devel-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605834" comment="libvirt-doc-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605835" comment="libvirt-libs-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605836" comment="libvirt-lock-sanlock-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605837" comment="libvirt-nss-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605838" comment="wireshark-plugin-libvirt-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15719</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15719" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15719" ref_url="https://www.suse.com/security/cve/CVE-2020-15719" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007391.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html" source="SUSE-SU"/>
    <description>
    libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15719/">CVE-2020-15719</cve>
	<bugzilla href="https://bugzilla.suse.com/1174154">SUSE bug 1174154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605202" comment="libldap-2_4-2-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605203" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605204" comment="libldap-data-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605205" comment="openldap2-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605206" comment="openldap2-back-meta-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605207" comment="openldap2-back-perl-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605208" comment="openldap2-back-sock-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605209" comment="openldap2-back-sql-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605210" comment="openldap2-client-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605211" comment="openldap2-contrib-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605212" comment="openldap2-devel-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605213" comment="openldap2-devel-32bit-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605214" comment="openldap2-devel-static-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605215" comment="openldap2-doc-2.4.46-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605216" comment="openldap2-ppolicy-check-password-1.2-lp151.10.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15780</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15780" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174186">SUSE bug 1174186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15803" ref_url="https://www.suse.com/security/cve/CVE-2020-15803" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007269.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDFZEEJCPRPPDEWV6JULRJZVSQCMYOEY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTUQBSMWYBVSTVDYNNRW5EOI5CCOSTPZ/" source="SUSE-SU"/>
    <description>
    Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15803/">CVE-2020-15803</cve>
	<bugzilla href="https://bugzilla.suse.com/1174253">SUSE bug 1174253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609836" comment="zabbix-agent-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294885" comment="zabbix-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609837" comment="zabbix-bash-completion-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294887" comment="zabbix-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609838" comment="zabbix-java-gateway-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294889" comment="zabbix-java-gateway is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609839" comment="zabbix-phpfrontend-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294891" comment="zabbix-phpfrontend is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609840" comment="zabbix-proxy-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294893" comment="zabbix-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609841" comment="zabbix-proxy-mysql-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294895" comment="zabbix-proxy-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609842" comment="zabbix-proxy-postgresql-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294897" comment="zabbix-proxy-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609843" comment="zabbix-proxy-sqlite-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294899" comment="zabbix-proxy-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609844" comment="zabbix-server-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294901" comment="zabbix-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609845" comment="zabbix-server-mysql-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294903" comment="zabbix-server-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609846" comment="zabbix-server-postgresql-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294905" comment="zabbix-server-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609847" comment="zabbix-server-sqlite-3.0.31-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009294907" comment="zabbix-server-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15810</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810" source="SUSE CVE"/>
		<reference ref_id="GHSA-3365-q9qx-f98m" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-3365-q9qx-f98m" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-15"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605085" comment="squid-4.13-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15811</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811" source="SUSE CVE"/>
		<reference ref_id="GHSA-c7p8-xqhm-49wv" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-c7p8-xqhm-49wv" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-13"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605085" comment="squid-4.13-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15900</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00006.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604479" comment="ghostscript-9.52-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151933" comment="ghostscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604480" comment="ghostscript-devel-9.52-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151934" comment="ghostscript-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604481" comment="ghostscript-mini-9.52-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151935" comment="ghostscript-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604482" comment="ghostscript-mini-devel-9.52-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151936" comment="ghostscript-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604483" comment="ghostscript-x11-9.52-lp151.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151937" comment="ghostscript-x11 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15917</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15917" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15917" ref_url="https://www.suse.com/security/cve/CVE-2020-15917" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2VE6WDEXX6HETWFB6EGOWAEY6QQSAI6E/" source="SUSE-SU"/>
    <description>
    common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15917/">CVE-2020-15917</cve>
	<bugzilla href="https://bugzilla.suse.com/1174457">SUSE bug 1174457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609863" comment="claws-mail-3.17.8-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151767" comment="claws-mail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609864" comment="claws-mail-devel-3.17.8-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153189" comment="claws-mail-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609865" comment="claws-mail-lang-3.17.8-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151768" comment="claws-mail-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15959</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15959" ref_url="https://www.suse.com/security/cve/CVE-2020-15959" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15959/">CVE-2020-15959</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15960</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15960" ref_url="https://www.suse.com/security/cve/CVE-2020-15960" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in storage in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15960/">CVE-2020-15960</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609869" comment="chromedriver-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609870" comment="chromium-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15961</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15961" ref_url="https://www.suse.com/security/cve/CVE-2020-15961" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15961/">CVE-2020-15961</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609869" comment="chromedriver-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609870" comment="chromium-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15962</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15962" ref_url="https://www.suse.com/security/cve/CVE-2020-15962" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy validation in serial in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15962/">CVE-2020-15962</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609869" comment="chromedriver-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609870" comment="chromium-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15963</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15963" ref_url="https://www.suse.com/security/cve/CVE-2020-15963" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15963/">CVE-2020-15963</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609869" comment="chromedriver-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609870" comment="chromium-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15964</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15964" ref_url="https://www.suse.com/security/cve/CVE-2020-15964" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in media in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15964/">CVE-2020-15964</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609869" comment="chromedriver-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609870" comment="chromium-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15965</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15965" ref_url="https://www.suse.com/security/cve/CVE-2020-15965" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15965/">CVE-2020-15965</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609869" comment="chromedriver-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609870" comment="chromium-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15966</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15966" ref_url="https://www.suse.com/security/cve/CVE-2020-15966" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1542-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1550-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15966/">CVE-2020-15966</cve>
	<bugzilla href="https://bugzilla.suse.com/1176791">SUSE bug 1176791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176799">SUSE bug 1176799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609869" comment="chromedriver-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609870" comment="chromium-85.0.4183.121-lp151.2.136.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15967</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15967" ref_url="https://www.suse.com/security/cve/CVE-2020-15967" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in payments in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15967/">CVE-2020-15967</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15968</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15968" ref_url="https://www.suse.com/security/cve/CVE-2020-15968" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15968/">CVE-2020-15968</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15969</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605709" comment="MozillaFirefox-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605710" comment="MozillaFirefox-branding-upstream-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605711" comment="MozillaFirefox-buildsymbols-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605712" comment="MozillaFirefox-devel-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605713" comment="MozillaFirefox-translations-common-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605714" comment="MozillaFirefox-translations-other-78.4.0-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605839" comment="MozillaThunderbird-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605840" comment="MozillaThunderbird-translations-common-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605841" comment="MozillaThunderbird-translations-other-78.4.0-lp151.2.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605842" comment="mozilla-nspr-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152084" comment="mozilla-nspr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605843" comment="mozilla-nspr-32bit-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152812" comment="mozilla-nspr-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605844" comment="mozilla-nspr-devel-4.25.1-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152085" comment="mozilla-nspr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15970</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15970" ref_url="https://www.suse.com/security/cve/CVE-2020-15970" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15970/">CVE-2020-15970</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15971</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15971" ref_url="https://www.suse.com/security/cve/CVE-2020-15971" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in printing in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15971/">CVE-2020-15971</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15972</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15972" ref_url="https://www.suse.com/security/cve/CVE-2020-15972" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15972/">CVE-2020-15972</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15973" ref_url="https://www.suse.com/security/cve/CVE-2020-15973" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15973/">CVE-2020-15973</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15974" ref_url="https://www.suse.com/security/cve/CVE-2020-15974" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15974/">CVE-2020-15974</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15975</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15975" ref_url="https://www.suse.com/security/cve/CVE-2020-15975" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in SwiftShader in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15975/">CVE-2020-15975</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15976</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15976" ref_url="https://www.suse.com/security/cve/CVE-2020-15976" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in WebXR in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15976/">CVE-2020-15976</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15977</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15977" ref_url="https://www.suse.com/security/cve/CVE-2020-15977" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in dialogs in Google Chrome on OS X prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15977/">CVE-2020-15977</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15978</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15978" ref_url="https://www.suse.com/security/cve/CVE-2020-15978" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in navigation in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15978/">CVE-2020-15978</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15979</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15979" ref_url="https://www.suse.com/security/cve/CVE-2020-15979" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15979/">CVE-2020-15979</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15980</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15980" ref_url="https://www.suse.com/security/cve/CVE-2020-15980" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Intents in Google Chrome on Android prior to 86.0.4240.75 allowed a local attacker to bypass navigation restrictions via crafted Intents.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15980/">CVE-2020-15980</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15981</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15981" ref_url="https://www.suse.com/security/cve/CVE-2020-15981" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15981/">CVE-2020-15981</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15982</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15982" ref_url="https://www.suse.com/security/cve/CVE-2020-15982" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in cache in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15982/">CVE-2020-15982</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15983" ref_url="https://www.suse.com/security/cve/CVE-2020-15983" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in webUI in Google Chrome on ChromeOS prior to 86.0.4240.75 allowed a local attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15983/">CVE-2020-15983</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15984</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15984" ref_url="https://www.suse.com/security/cve/CVE-2020-15984" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Omnibox in Google Chrome on iOS prior to 86.0.4240.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15984/">CVE-2020-15984</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15985</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15985" ref_url="https://www.suse.com/security/cve/CVE-2020-15985" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15985/">CVE-2020-15985</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15986</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15986" ref_url="https://www.suse.com/security/cve/CVE-2020-15986" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in media in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15986/">CVE-2020-15986</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15987</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15987" ref_url="https://www.suse.com/security/cve/CVE-2020-15987" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15987/">CVE-2020-15987</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15988</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15988" ref_url="https://www.suse.com/security/cve/CVE-2020-15988" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15988/">CVE-2020-15988</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15989</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15989" ref_url="https://www.suse.com/security/cve/CVE-2020-15989" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Uninitialized data in PDFium in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15989/">CVE-2020-15989</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15990</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15990" ref_url="https://www.suse.com/security/cve/CVE-2020-15990" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in autofill in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15990/">CVE-2020-15990</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15991</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15991" ref_url="https://www.suse.com/security/cve/CVE-2020-15991" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in password manager in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15991/">CVE-2020-15991</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15992</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15992" ref_url="https://www.suse.com/security/cve/CVE-2020-15992" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15992/">CVE-2020-15992</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15995</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15995" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15995" ref_url="https://www.suse.com/security/cve/CVE-2020-15995" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Out of bounds write in V8 in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15995/">CVE-2020-15995</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15999</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-11"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605693" comment="chromedriver-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605694" comment="chromium-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605715" comment="freetype2-devel-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151246" comment="freetype2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605716" comment="freetype2-devel-32bit-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171242" comment="freetype2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605717" comment="freetype2-profile-tti35-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283722" comment="freetype2-profile-tti35 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605718" comment="ft2demos-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151247" comment="ft2demos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605719" comment="ftbench-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177150" comment="ftbench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605720" comment="ftdiff-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177151" comment="ftdiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605721" comment="ftdump-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177152" comment="ftdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605722" comment="ftgamma-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177153" comment="ftgamma is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605723" comment="ftgrid-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177154" comment="ftgrid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605724" comment="ftinspect-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177155" comment="ftinspect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605725" comment="ftlint-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177156" comment="ftlint is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605726" comment="ftmulti-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177157" comment="ftmulti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605727" comment="ftstring-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177158" comment="ftstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605728" comment="ftvalid-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177159" comment="ftvalid is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605729" comment="ftview-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177160" comment="ftview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605730" comment="libfreetype6-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605731" comment="libfreetype6-32bit-2.10.1-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151249" comment="libfreetype6-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16000</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16000" ref_url="https://www.suse.com/security/cve/CVE-2020-16000" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16000/">CVE-2020-16000</cve>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605693" comment="chromedriver-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605694" comment="chromium-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16001</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16001" ref_url="https://www.suse.com/security/cve/CVE-2020-16001" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16001/">CVE-2020-16001</cve>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605693" comment="chromedriver-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605694" comment="chromium-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16002</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16002" ref_url="https://www.suse.com/security/cve/CVE-2020-16002" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Use after free in PDFium in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16002/">CVE-2020-16002</cve>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605693" comment="chromedriver-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605694" comment="chromium-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16003</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16003" ref_url="https://www.suse.com/security/cve/CVE-2020-16003" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Use after free in printing in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16003/">CVE-2020-16003</cve>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605693" comment="chromedriver-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605694" comment="chromium-86.0.4240.111-lp151.2.147.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16004</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16004" ref_url="https://www.suse.com/security/cve/CVE-2020-16004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Use after free in user interface in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16004/">CVE-2020-16004</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609875" comment="chromedriver-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609876" comment="chromium-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16005</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16005" ref_url="https://www.suse.com/security/cve/CVE-2020-16005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in ANGLE in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16005/">CVE-2020-16005</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609875" comment="chromedriver-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609876" comment="chromium-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16006</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16006" ref_url="https://www.suse.com/security/cve/CVE-2020-16006" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16006/">CVE-2020-16006</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609875" comment="chromedriver-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609876" comment="chromium-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16007</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16007" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16007" ref_url="https://www.suse.com/security/cve/CVE-2020-16007" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in installer in Google Chrome prior to 86.0.4240.183 allowed a local attacker to potentially elevate privilege via a crafted filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16007/">CVE-2020-16007</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609875" comment="chromedriver-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609876" comment="chromium-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16008</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16008" ref_url="https://www.suse.com/security/cve/CVE-2020-16008" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16008/">CVE-2020-16008</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609875" comment="chromedriver-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609876" comment="chromium-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16009</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16009" ref_url="https://www.suse.com/security/cve/CVE-2020-16009" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16009/">CVE-2020-16009</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609875" comment="chromedriver-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609876" comment="chromium-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16011</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16011" ref_url="https://www.suse.com/security/cve/CVE-2020-16011" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABZ54FWLCGQJEV7RPVRMYY7B5D4OPJ4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in UI in Google Chrome on Windows prior to 86.0.4240.183 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16011/">CVE-2020-16011</cve>
	<bugzilla href="https://bugzilla.suse.com/1178375">SUSE bug 1178375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609874" comment="opera-72.0.3815.320-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609875" comment="chromedriver-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609876" comment="chromium-86.0.4240.183-lp151.2.150.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16012</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16013</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16013" ref_url="https://www.suse.com/security/cve/CVE-2020-16013" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1929-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGRLB34GVO6HCDVG2KNYFJ6QDDAJAJQL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANOJKJGKULVXQB2C3UGQREMNTAMBT2TN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPTIP6IPJZXPO6V6HSNDVUIUI6Q7O5CQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATY43F3BVWRUUGKVEMXHKDP7IZZROP3M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELOCKFRXJEKGKGO7AQH4WNPKH7IYSMSR/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16013/">CVE-2020-16013</cve>
	<bugzilla href="https://bugzilla.suse.com/1178703">SUSE bug 1178703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609879" comment="opera-72.0.3815.400-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609877" comment="chromedriver-86.0.4240.198-lp151.2.153.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609878" comment="chromium-86.0.4240.198-lp151.2.153.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16014</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16014" ref_url="https://www.suse.com/security/cve/CVE-2020-16014" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16014/">CVE-2020-16014</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16015</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16015" ref_url="https://www.suse.com/security/cve/CVE-2020-16015" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in WASM in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16015/">CVE-2020-16015</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16016</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16016" ref_url="https://www.suse.com/security/cve/CVE-2020-16016" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1929-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGRLB34GVO6HCDVG2KNYFJ6QDDAJAJQL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANOJKJGKULVXQB2C3UGQREMNTAMBT2TN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPTIP6IPJZXPO6V6HSNDVUIUI6Q7O5CQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATY43F3BVWRUUGKVEMXHKDP7IZZROP3M/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in base in Google Chrome prior to 86.0.4240.193 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16016/">CVE-2020-16016</cve>
	<bugzilla href="https://bugzilla.suse.com/1178630">SUSE bug 1178630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609877" comment="chromedriver-86.0.4240.198-lp151.2.153.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609878" comment="chromium-86.0.4240.198-lp151.2.153.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16017</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16017" ref_url="https://www.suse.com/security/cve/CVE-2020-16017" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1929-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGRLB34GVO6HCDVG2KNYFJ6QDDAJAJQL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANOJKJGKULVXQB2C3UGQREMNTAMBT2TN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPTIP6IPJZXPO6V6HSNDVUIUI6Q7O5CQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATY43F3BVWRUUGKVEMXHKDP7IZZROP3M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELOCKFRXJEKGKGO7AQH4WNPKH7IYSMSR/" source="SUSE-SU"/>
    <description>
    Use after free in site isolation in Google Chrome prior to 86.0.4240.198 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16017/">CVE-2020-16017</cve>
	<bugzilla href="https://bugzilla.suse.com/1178703">SUSE bug 1178703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609879" comment="opera-72.0.3815.400-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609877" comment="chromedriver-86.0.4240.198-lp151.2.153.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609878" comment="chromium-86.0.4240.198-lp151.2.153.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16018</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16018" ref_url="https://www.suse.com/security/cve/CVE-2020-16018" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Use after free in payments in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16018/">CVE-2020-16018</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16019</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16019" ref_url="https://www.suse.com/security/cve/CVE-2020-16019" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in filesystem in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass noexec restrictions via a malicious file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16019/">CVE-2020-16019</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16020</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16020" ref_url="https://www.suse.com/security/cve/CVE-2020-16020" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in cryptohome in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass discretionary access control via a malicious file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16020/">CVE-2020-16020</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16021</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16021" ref_url="https://www.suse.com/security/cve/CVE-2020-16021" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Race in image burner in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to perform OS-level privilege escalation via a malicious file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16021/">CVE-2020-16021</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16022</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16022" ref_url="https://www.suse.com/security/cve/CVE-2020-16022" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in networking in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially bypass firewall controls via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16022/">CVE-2020-16022</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16023" ref_url="https://www.suse.com/security/cve/CVE-2020-16023" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Use after free in WebCodecs in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16023/">CVE-2020-16023</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16024</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16024" ref_url="https://www.suse.com/security/cve/CVE-2020-16024" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16024/">CVE-2020-16024</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16025</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16025" ref_url="https://www.suse.com/security/cve/CVE-2020-16025" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in clipboard in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16025/">CVE-2020-16025</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16026</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16026" ref_url="https://www.suse.com/security/cve/CVE-2020-16026" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16026/">CVE-2020-16026</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16027</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16027" ref_url="https://www.suse.com/security/cve/CVE-2020-16027" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 87.0.4280.66 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from the user's disk via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16027/">CVE-2020-16027</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16028</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16028" ref_url="https://www.suse.com/security/cve/CVE-2020-16028" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16028/">CVE-2020-16028</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16029</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16029" ref_url="https://www.suse.com/security/cve/CVE-2020-16029" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in PDFium in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to bypass navigation restrictions via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16029/">CVE-2020-16029</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16030</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16030" ref_url="https://www.suse.com/security/cve/CVE-2020-16030" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Blink in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16030/">CVE-2020-16030</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16031</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16031" ref_url="https://www.suse.com/security/cve/CVE-2020-16031" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16031/">CVE-2020-16031</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16032</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16032" ref_url="https://www.suse.com/security/cve/CVE-2020-16032" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in sharing in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16032/">CVE-2020-16032</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16033</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16033" ref_url="https://www.suse.com/security/cve/CVE-2020-16033" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebUSB in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16033/">CVE-2020-16033</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16034</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16034" ref_url="https://www.suse.com/security/cve/CVE-2020-16034" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a local attacker to bypass policy restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16034/">CVE-2020-16034</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16035</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16035" ref_url="https://www.suse.com/security/cve/CVE-2020-16035" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in cros-disks in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass noexec restrictions via a malicious file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16035/">CVE-2020-16035</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16036</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16036" ref_url="https://www.suse.com/security/cve/CVE-2020-16036" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in cookies in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to bypass cookie restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16036/">CVE-2020-16036</cve>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606265" comment="chromedriver-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606266" comment="chromium-87.0.4280.66-lp151.2.156.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16037</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16037" ref_url="https://www.suse.com/security/cve/CVE-2020-16037" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Use after free in clipboard in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16037/">CVE-2020-16037</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606935" comment="opera-73.0.3856.284-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606731" comment="chromedriver-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606732" comment="chromium-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16038</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16038" ref_url="https://www.suse.com/security/cve/CVE-2020-16038" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome on OS X prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16038/">CVE-2020-16038</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606935" comment="opera-73.0.3856.284-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606731" comment="chromedriver-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606732" comment="chromium-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16039" ref_url="https://www.suse.com/security/cve/CVE-2020-16039" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Use after free in extensions in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16039/">CVE-2020-16039</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606935" comment="opera-73.0.3856.284-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606731" comment="chromedriver-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606732" comment="chromium-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16040</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16040" ref_url="https://www.suse.com/security/cve/CVE-2020-16040" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16040/">CVE-2020-16040</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606935" comment="opera-73.0.3856.284-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606731" comment="chromedriver-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606732" comment="chromium-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16041</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16041" ref_url="https://www.suse.com/security/cve/CVE-2020-16041" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Out of bounds read in networking in Google Chrome prior to 87.0.4280.88 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-16041/">CVE-2020-16041</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606935" comment="opera-73.0.3856.284-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606731" comment="chromedriver-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606732" comment="chromium-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16042</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606935" comment="opera-73.0.3856.284-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606877" comment="MozillaFirefox-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606878" comment="MozillaFirefox-branding-upstream-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606879" comment="MozillaFirefox-buildsymbols-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606880" comment="MozillaFirefox-devel-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606881" comment="MozillaFirefox-translations-common-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606882" comment="MozillaFirefox-translations-other-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606874" comment="MozillaThunderbird-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606875" comment="MozillaThunderbird-translations-common-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606876" comment="MozillaThunderbird-translations-other-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606731" comment="chromedriver-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606732" comment="chromium-87.0.4280.88-lp151.2.162.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16043</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16043" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16043" ref_url="https://www.suse.com/security/cve/CVE-2020-16043" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in networking in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to bypass discretionary access control via malicious network traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16043/">CVE-2020-16043</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16044</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWW23OVUF57OUUNFOOBPRID66YRCNBPH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R64OG7KLB7DVCRVNOYE46AZ266XQ2F23/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72PBD5PFZIW6WZ7R65QRFVISRDWYC6WO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3236IRHAJFLO3NB3KMMBI5XYZOZFL6S7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609499" comment="MozillaFirefox-78.6.1-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609500" comment="MozillaFirefox-branding-upstream-78.6.1-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609501" comment="MozillaFirefox-buildsymbols-78.6.1-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609502" comment="MozillaFirefox-devel-78.6.1-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609503" comment="MozillaFirefox-translations-common-78.6.1-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609504" comment="MozillaFirefox-translations-other-78.6.1-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609428" comment="MozillaThunderbird-78.6.1-lp151.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609429" comment="MozillaThunderbird-translations-common-78.6.1-lp151.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609430" comment="MozillaThunderbird-translations-other-78.6.1-lp151.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16116</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16116" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16116" ref_url="https://www.suse.com/security/cve/CVE-2020-16116" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00045.html" source="SUSE-SU"/>
    <description>
    In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16116/">CVE-2020-16116</cve>
	<bugzilla href="https://bugzilla.suse.com/1174773">SUSE bug 1174773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609880" comment="ark-18.12.3-lp151.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154016" comment="ark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609881" comment="ark-lang-18.12.3-lp151.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289271" comment="ark-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609882" comment="libkerfuffle18-18.12.3-lp151.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289272" comment="libkerfuffle18 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16118</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16118" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16118" ref_url="https://www.suse.com/security/cve/CVE-2020-16118" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00045.html" source="SUSE-SU"/>
    <description>
    In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16118/">CVE-2020-16118</cve>
	<bugzilla href="https://bugzilla.suse.com/1174711">SUSE bug 1174711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604619" comment="balsa-2.5.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289523" comment="balsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604620" comment="balsa-lang-2.5.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289524" comment="balsa-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16120</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16120" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef ("ovl: stack file ops"). This was fixed in kernel version 5.8 by commits 56230d9 ("ovl: verify permissions in ovl_path_open()"), 48bd024 ("ovl: switch to mounter creds in readdir") and 05acefb ("ovl: check permission to open real file"). Additionally, commits 130fdbc ("ovl: pass correct flags for opening real directory") and 292f902 ("ovl: call secutiry hook in ovl_real_ioctl()") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da ("ovl: do not fail because of O_NOATIMEi") in kernel 5.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606106" comment="kernel-debug-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606107" comment="kernel-debug-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606108" comment="kernel-debug-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606109" comment="kernel-default-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606110" comment="kernel-default-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606111" comment="kernel-default-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606112" comment="kernel-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606113" comment="kernel-docs-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606114" comment="kernel-docs-html-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606115" comment="kernel-kvmsmall-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606116" comment="kernel-kvmsmall-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606117" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606118" comment="kernel-macros-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606119" comment="kernel-obs-build-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606120" comment="kernel-obs-qa-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606121" comment="kernel-source-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606122" comment="kernel-source-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606123" comment="kernel-syms-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606124" comment="kernel-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606125" comment="kernel-vanilla-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606126" comment="kernel-vanilla-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16121</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16121" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16121" ref_url="https://www.suse.com/security/cve/CVE-2020-16121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMDG3TCU5LRAC7S5OQFWQ2ZCJ6MQPUSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2344-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZ7V5X4VPZ6MTETS6GU4AOZBIWDADE3U/" source="SUSE-SU"/>
    <description>
    PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16121/">CVE-2020-16121</cve>
	<bugzilla href="https://bugzilla.suse.com/1176930">SUSE bug 1176930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606800" comment="PackageKit-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174862" comment="PackageKit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606801" comment="PackageKit-backend-zypp-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174863" comment="PackageKit-backend-zypp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606802" comment="PackageKit-branding-upstream-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174864" comment="PackageKit-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606803" comment="PackageKit-devel-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174865" comment="PackageKit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606804" comment="PackageKit-gstreamer-plugin-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174866" comment="PackageKit-gstreamer-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606805" comment="PackageKit-gtk3-module-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174867" comment="PackageKit-gtk3-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606806" comment="PackageKit-lang-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174868" comment="PackageKit-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606807" comment="libpackagekit-glib2-18-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174869" comment="libpackagekit-glib2-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606808" comment="libpackagekit-glib2-devel-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174871" comment="libpackagekit-glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606809" comment="typelib-1_0-PackageKitGlib-1_0-1.1.10-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174873" comment="typelib-1_0-PackageKitGlib-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16125</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16125" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZX3UTGQD6BVLNXN2RQDQJAGIEKRWA7A4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2264-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSCPFN6UQDWHTSA3DT4W6QWNTQE4X4HE/" source="SUSE-SU"/>
    <description>
    gdm3 versions before 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can't contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to create a new privileged account.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125</cve>
	<bugzilla href="https://bugzilla.suse.com/1140851">SUSE bug 1140851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606749" comment="gdm-3.26.2.1-lp151.16.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151581" comment="gdm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606750" comment="gdm-branding-upstream-3.26.2.1-lp151.16.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235241" comment="gdm-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606751" comment="gdm-devel-3.26.2.1-lp151.16.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235242" comment="gdm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606752" comment="gdm-lang-3.26.2.1-lp151.16.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151582" comment="gdm-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606753" comment="gdmflexiserver-3.26.2.1-lp151.16.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151583" comment="gdmflexiserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606754" comment="libgdm1-3.26.2.1-lp151.16.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151584" comment="libgdm1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606755" comment="typelib-1_0-Gdm-1_0-3.26.2.1-lp151.16.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151585" comment="typelib-1_0-Gdm-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16145</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16145" ref_url="https://www.suse.com/security/cve/CVE-2020-16145" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1516-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html" source="SUSE-SU"/>
    <description>
    Roundcube Webmail before 1.3.15 and 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document. This issue has been fixed in 1.4.8 and 1.3.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16145/">CVE-2020-16145</cve>
	<bugzilla href="https://bugzilla.suse.com/1175135">SUSE bug 1175135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609735" comment="roundcubemail-1.3.15-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16166</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604491" comment="kernel-debug-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604492" comment="kernel-debug-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604493" comment="kernel-debug-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604494" comment="kernel-default-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604495" comment="kernel-default-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604496" comment="kernel-default-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604497" comment="kernel-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604498" comment="kernel-docs-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604499" comment="kernel-docs-html-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604500" comment="kernel-kvmsmall-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604501" comment="kernel-kvmsmall-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604502" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604503" comment="kernel-macros-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604504" comment="kernel-obs-build-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604505" comment="kernel-obs-qa-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604506" comment="kernel-source-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604507" comment="kernel-source-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604508" comment="kernel-syms-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604509" comment="kernel-vanilla-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604510" comment="kernel-vanilla-base-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604511" comment="kernel-vanilla-devel-4.12.14-lp151.28.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16587</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16587" ref_url="https://www.suse.com/security/cve/CVE-2020-16587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4FRZPNDH3SM5DRWM4ITYTYRZIOVKUGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESEVYLX65LTFDH2ZVMY2Y4AN2MUHW5M5/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow vulnerability exists in Academy Software Foundation OpenEXR 2.3.0 in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp that can cause a denial of service via a crafted EXR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16587/">CVE-2020-16587</cve>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180108">SUSE bug 1180108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180109">SUSE bug 1180109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606916" comment="libIlmImf-2_2-23-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606917" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606918" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606919" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606920" comment="openexr-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606921" comment="openexr-devel-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606922" comment="openexr-doc-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16588</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16588" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16588" ref_url="https://www.suse.com/security/cve/CVE-2020-16588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4FRZPNDH3SM5DRWM4ITYTYRZIOVKUGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESEVYLX65LTFDH2ZVMY2Y4AN2MUHW5M5/" source="SUSE-SU"/>
    <description>
    A Null Pointer Deference issue exists in Academy Software Foundation OpenEXR 2.3.0 in generatePreview in makePreview.cpp that can cause a denial of service via a crafted EXR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16588/">CVE-2020-16588</cve>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180108">SUSE bug 1180108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606916" comment="libIlmImf-2_2-23-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606917" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606918" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606919" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606920" comment="openexr-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606921" comment="openexr-devel-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606922" comment="openexr-doc-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16589</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16589" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16589" ref_url="https://www.suse.com/security/cve/CVE-2020-16589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4FRZPNDH3SM5DRWM4ITYTYRZIOVKUGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESEVYLX65LTFDH2ZVMY2Y4AN2MUHW5M5/" source="SUSE-SU"/>
    <description>
    A head-based buffer overflow exists in Academy Software Foundation OpenEXR 2.3.0 in writeTileData in ImfTiledOutputFile.cpp that can cause a denial of service via a crafted EXR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16589/">CVE-2020-16589</cve>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180109">SUSE bug 1180109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606916" comment="libIlmImf-2_2-23-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177161" comment="libIlmImf-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606917" comment="libIlmImf-2_2-23-32bit-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251976" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606918" comment="libIlmImfUtil-2_2-23-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251977" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606919" comment="libIlmImfUtil-2_2-23-32bit-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251978" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606920" comment="openexr-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606921" comment="openexr-devel-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606922" comment="openexr-doc-2.2.1-lp151.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16845</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16845" ref_url="https://www.suse.com/security/cve/CVE-2020-16845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" source="SUSE-SU"/>
    <description>
    Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16845/">CVE-2020-16845</cve>
	<bugzilla href="https://bugzilla.suse.com/1174977">SUSE bug 1174977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604591" comment="go1.13-1.13.15-lp151.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287972" comment="go1.13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604592" comment="go1.13-doc-1.13.15-lp151.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287973" comment="go1.13-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604593" comment="go1.13-race-1.13.15-lp151.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287974" comment="go1.13-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605187" comment="go1.14-1.14.7-lp151.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605188" comment="go1.14-doc-1.14.7-lp151.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605189" comment="go1.14-race-1.14.7-lp151.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16846</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16846" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="TID000019775" ref_url="https://www.suse.com/support/kb/doc/?id=000019775" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846</cve>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606027" comment="python2-salt-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606028" comment="python3-salt-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606029" comment="salt-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606030" comment="salt-api-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606031" comment="salt-bash-completion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606032" comment="salt-cloud-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606033" comment="salt-doc-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606034" comment="salt-fish-completion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606035" comment="salt-master-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606036" comment="salt-minion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606037" comment="salt-proxy-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606038" comment="salt-ssh-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606039" comment="salt-standalone-formulas-configuration-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606040" comment="salt-syndic-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606041" comment="salt-zsh-completion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1699</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1699" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1699" ref_url="https://www.suse.com/security/cve/CVE-2020-1699" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html" source="SUSE-SU"/>
    <description>
    A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine running the Ceph dashboard.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1699/">CVE-2020-1699</cve>
	<bugzilla href="https://bugzilla.suse.com/1161074">SUSE bug 1161074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606042" comment="ceph-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606043" comment="ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606044" comment="ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606045" comment="ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278214" comment="ceph-dashboard-e2e is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606046" comment="ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606047" comment="ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606048" comment="ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606049" comment="ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606050" comment="ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606051" comment="ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606052" comment="ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606053" comment="ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606054" comment="ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606055" comment="ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278221" comment="ceph-mgr-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606056" comment="ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606057" comment="ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606058" comment="ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606059" comment="ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606060" comment="ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154235" comment="ceph-resource-agents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606061" comment="ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606062" comment="cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606063" comment="libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606064" comment="libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606065" comment="librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606066" comment="librados2-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606067" comment="libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606068" comment="libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154241" comment="libradosstriper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606069" comment="libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154242" comment="libradosstriper1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606070" comment="librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606071" comment="librbd1-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606072" comment="librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606073" comment="librgw2-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606074" comment="python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606075" comment="python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606076" comment="python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606077" comment="python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606078" comment="python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606079" comment="rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606080" comment="rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606081" comment="rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606082" comment="rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1700</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1700" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1700" ref_url="https://www.suse.com/security/cve/CVE-2020-1700" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1700/">CVE-2020-1700</cve>
	<bugzilla href="https://bugzilla.suse.com/1161312">SUSE bug 1161312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606042" comment="ceph-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606043" comment="ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606044" comment="ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606045" comment="ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278214" comment="ceph-dashboard-e2e is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606046" comment="ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606047" comment="ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606048" comment="ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606049" comment="ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606050" comment="ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606051" comment="ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606052" comment="ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606053" comment="ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606054" comment="ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606055" comment="ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278221" comment="ceph-mgr-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606056" comment="ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606057" comment="ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606058" comment="ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606059" comment="ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606060" comment="ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154235" comment="ceph-resource-agents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606061" comment="ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606062" comment="cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606063" comment="libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606064" comment="libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606065" comment="librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606066" comment="librados2-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606067" comment="libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606068" comment="libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154241" comment="libradosstriper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606069" comment="libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154242" comment="libradosstriper1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606070" comment="librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606071" comment="librbd1-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606072" comment="librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606073" comment="librgw2-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606074" comment="python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606075" comment="python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606076" comment="python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606077" comment="python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606078" comment="python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606079" comment="rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606080" comment="rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606081" comment="rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606082" comment="rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1711</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607382" comment="qemu-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607383" comment="qemu-arm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607384" comment="qemu-audio-alsa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607385" comment="qemu-audio-oss-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607386" comment="qemu-audio-pa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607387" comment="qemu-audio-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607388" comment="qemu-block-curl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607389" comment="qemu-block-dmg-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607390" comment="qemu-block-gluster-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607391" comment="qemu-block-iscsi-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607392" comment="qemu-block-nfs-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607393" comment="qemu-block-rbd-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607394" comment="qemu-block-ssh-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607395" comment="qemu-extra-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607396" comment="qemu-guest-agent-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607397" comment="qemu-ipxe-1.0.0+-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607398" comment="qemu-ksm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607399" comment="qemu-kvm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607400" comment="qemu-lang-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607401" comment="qemu-linux-user-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607402" comment="qemu-ppc-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607403" comment="qemu-s390-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607404" comment="qemu-seabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607405" comment="qemu-sgabios-8-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607406" comment="qemu-tools-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607407" comment="qemu-ui-curses-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607408" comment="qemu-ui-gtk-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607409" comment="qemu-ui-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607410" comment="qemu-vgabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607411" comment="qemu-x86-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1712</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:46-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:47-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:48-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:98-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:99-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006464.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html" source="SUSE-SU"/>
    <description>
    A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609883" comment="libsystemd0-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154102" comment="libsystemd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609884" comment="libsystemd0-32bit-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154103" comment="libsystemd0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609885" comment="libsystemd0-mini-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154202" comment="libsystemd0-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609886" comment="libudev-devel-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151690" comment="libudev-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609887" comment="libudev-devel-32bit-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239129" comment="libudev-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609888" comment="libudev-mini-devel-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152578" comment="libudev-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609889" comment="libudev-mini1-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152579" comment="libudev-mini1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609890" comment="libudev1-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609891" comment="libudev1-32bit-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151692" comment="libudev1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609892" comment="nss-myhostname-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152580" comment="nss-myhostname is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609893" comment="nss-myhostname-32bit-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152581" comment="nss-myhostname-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609894" comment="nss-mymachines-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154203" comment="nss-mymachines is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609895" comment="nss-mymachines-32bit-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239130" comment="nss-mymachines-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609896" comment="nss-systemd-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239131" comment="nss-systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609897" comment="systemd-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609898" comment="systemd-32bit-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151694" comment="systemd-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609899" comment="systemd-bash-completion-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151695" comment="systemd-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609900" comment="systemd-container-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239132" comment="systemd-container is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609901" comment="systemd-coredump-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239133" comment="systemd-coredump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609902" comment="systemd-devel-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152582" comment="systemd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609903" comment="systemd-logger-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151696" comment="systemd-logger is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609904" comment="systemd-mini-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152584" comment="systemd-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609905" comment="systemd-mini-bash-completion-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154204" comment="systemd-mini-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609906" comment="systemd-mini-container-mini-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239134" comment="systemd-mini-container-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609907" comment="systemd-mini-coredump-mini-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239135" comment="systemd-mini-coredump-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609908" comment="systemd-mini-devel-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152585" comment="systemd-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609909" comment="systemd-mini-sysvinit-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152586" comment="systemd-mini-sysvinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609910" comment="systemd-sysvinit-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609911" comment="udev-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609912" comment="udev-mini-234-lp151.26.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152587" comment="udev-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1720</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION", where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604860" comment="libecpg6-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607026" comment="libecpg6-32bit-10.12-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151070" comment="libecpg6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604861" comment="libpq5-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607028" comment="libpq5-32bit-10.12-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151072" comment="libpq5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604862" comment="postgresql-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604863" comment="postgresql-contrib-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604864" comment="postgresql-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604865" comment="postgresql-docs-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604866" comment="postgresql-llvmjit-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604867" comment="postgresql-plperl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604868" comment="postgresql-plpython-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604869" comment="postgresql-pltcl-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604870" comment="postgresql-server-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604871" comment="postgresql-server-devel-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604872" comment="postgresql-test-12.0.1-lp151.6.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604873" comment="postgresql10-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604874" comment="postgresql10-contrib-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604875" comment="postgresql10-devel-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604876" comment="postgresql10-docs-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604877" comment="postgresql10-plperl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604878" comment="postgresql10-plpython-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604879" comment="postgresql10-pltcl-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604880" comment="postgresql10-server-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604881" comment="postgresql10-test-10.13-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604882" comment="postgresql12-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604883" comment="postgresql12-contrib-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604884" comment="postgresql12-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604885" comment="postgresql12-docs-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604886" comment="postgresql12-llvmjit-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604887" comment="postgresql12-plperl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604888" comment="postgresql12-plpython-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604889" comment="postgresql12-pltcl-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604890" comment="postgresql12-server-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604891" comment="postgresql12-server-devel-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604892" comment="postgresql12-test-12.3-lp151.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604893" comment="postgresql96-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161265" comment="postgresql96 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604894" comment="postgresql96-contrib-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161266" comment="postgresql96-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604895" comment="postgresql96-devel-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161267" comment="postgresql96-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604896" comment="postgresql96-docs-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161268" comment="postgresql96-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604897" comment="postgresql96-plperl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163501" comment="postgresql96-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604898" comment="postgresql96-plpython-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163503" comment="postgresql96-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604899" comment="postgresql96-pltcl-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163505" comment="postgresql96-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604900" comment="postgresql96-server-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161269" comment="postgresql96-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604901" comment="postgresql96-test-9.6.19-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009163508" comment="postgresql96-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1726</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1726" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1726" ref_url="https://www.suse.com/security/cve/CVE-2020-1726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1559-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1726/">CVE-2020-1726</cve>
	<bugzilla href="https://bugzilla.suse.com/1164090">SUSE bug 1164090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605421" comment="conmon-2.0.20-lp151.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280795" comment="conmon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605422" comment="fuse-overlayfs-1.1.2-lp151.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266785" comment="fuse-overlayfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605423" comment="libcontainers-common-20200727-lp151.2.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266789" comment="libcontainers-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605424" comment="podman-2.0.6-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605425" comment="podman-cni-config-2.0.6-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1730</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1730" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1730" ref_url="https://www.suse.com/security/cve/CVE-2020-1730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00018.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-1730/">CVE-2020-1730</cve>
	<bugzilla href="https://bugzilla.suse.com/1168699">SUSE bug 1168699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607517" comment="libssh-devel-0.8.7-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151771" comment="libssh-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607518" comment="libssh4-0.8.7-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607519" comment="libssh4-32bit-0.8.7-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153278" comment="libssh4-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1747</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1747" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747</cve>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607866" comment="python2-PyYAML-5.1.2-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281491" comment="python2-PyYAML is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607867" comment="python3-PyYAML-5.1.2-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281492" comment="python3-PyYAML is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17482</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17482" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17482" ref_url="https://www.suse.com/security/cve/CVE-2020-17482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007502.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00099.html" source="SUSE-SU"/>
    <description>
    An issue has been found in PowerDNS Authoritative Server before 4.3.1 where an authorized user with the ability to insert crafted records into a zone might be able to leak the content of uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-17482/">CVE-2020-17482</cve>
	<bugzilla href="https://bugzilla.suse.com/1176535">SUSE bug 1176535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609913" comment="pdns-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152980" comment="pdns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609914" comment="pdns-backend-geoip-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167901" comment="pdns-backend-geoip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609915" comment="pdns-backend-godbc-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167902" comment="pdns-backend-godbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609916" comment="pdns-backend-ldap-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152981" comment="pdns-backend-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609917" comment="pdns-backend-lua-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152982" comment="pdns-backend-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609918" comment="pdns-backend-mydns-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152983" comment="pdns-backend-mydns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609919" comment="pdns-backend-mysql-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152984" comment="pdns-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609920" comment="pdns-backend-postgresql-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152985" comment="pdns-backend-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609921" comment="pdns-backend-remote-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167903" comment="pdns-backend-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609922" comment="pdns-backend-sqlite3-4.1.8-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152986" comment="pdns-backend-sqlite3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1749</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605046" comment="kernel-debug-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605047" comment="kernel-debug-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605048" comment="kernel-debug-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605049" comment="kernel-default-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605050" comment="kernel-default-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605051" comment="kernel-default-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605052" comment="kernel-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605053" comment="kernel-docs-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605054" comment="kernel-docs-html-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605055" comment="kernel-kvmsmall-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605056" comment="kernel-kvmsmall-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605057" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605058" comment="kernel-macros-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605059" comment="kernel-obs-build-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605060" comment="kernel-obs-qa-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605061" comment="kernel-source-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605062" comment="kernel-source-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605063" comment="kernel-syms-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605064" comment="kernel-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605065" comment="kernel-vanilla-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605066" comment="kernel-vanilla-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17490</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="TID000019775" ref_url="https://www.suse.com/support/kb/doc/?id=000019775" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html" source="SUSE-SU"/>
    <description>
    The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490</cve>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606027" comment="python2-salt-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606028" comment="python3-salt-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606029" comment="salt-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606030" comment="salt-api-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606031" comment="salt-bash-completion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606032" comment="salt-cloud-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606033" comment="salt-doc-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606034" comment="salt-fish-completion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606035" comment="salt-master-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606036" comment="salt-minion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606037" comment="salt-proxy-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606038" comment="salt-ssh-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606039" comment="salt-standalone-formulas-configuration-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606040" comment="salt-syndic-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606041" comment="salt-zsh-completion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17498</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17498" ref_url="https://www.suse.com/security/cve/CVE-2020-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17498/">CVE-2020-17498</cve>
	<bugzilla href="https://bugzilla.suse.com/1175204">SUSE bug 1175204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606098" comment="libwireshark13-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606099" comment="libwiretap10-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606100" comment="libwsutil11-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606101" comment="wireshark-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606102" comment="wireshark-devel-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606103" comment="wireshark-ui-qt-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17507</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLSRXEMNPXJ5APSF7LPSU6DIH47XLGMI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt through 5.12.9, and 5.13.x through 5.15.x before 5.15.1. read_xbm_body in gui/image/qxbmhandler.cpp has a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605432" comment="libQt5Bootstrap-devel-static-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152268" comment="libQt5Bootstrap-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605433" comment="libQt5Concurrent-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152274" comment="libQt5Concurrent-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605434" comment="libQt5Concurrent5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152276" comment="libQt5Concurrent5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605435" comment="libQt5Core-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152278" comment="libQt5Core-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605436" comment="libQt5Core-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152280" comment="libQt5Core-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605437" comment="libQt5Core5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152281" comment="libQt5Core5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605438" comment="libQt5DBus-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152283" comment="libQt5DBus-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605439" comment="libQt5DBus-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152285" comment="libQt5DBus-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605440" comment="libQt5DBus5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152286" comment="libQt5DBus5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605441" comment="libQt5Gui-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152294" comment="libQt5Gui-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605442" comment="libQt5Gui-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152296" comment="libQt5Gui-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605443" comment="libQt5Gui5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152297" comment="libQt5Gui5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605444" comment="libQt5KmsSupport-devel-static-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245302" comment="libQt5KmsSupport-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605445" comment="libQt5KmsSupport-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245303" comment="libQt5KmsSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605446" comment="libQt5Network-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152305" comment="libQt5Network-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605447" comment="libQt5Network-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152307" comment="libQt5Network-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605448" comment="libQt5Network5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152308" comment="libQt5Network5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605449" comment="libQt5OpenGL-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152313" comment="libQt5OpenGL-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605450" comment="libQt5OpenGL-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152315" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605451" comment="libQt5OpenGL5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152316" comment="libQt5OpenGL5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605452" comment="libQt5OpenGLExtensions-devel-static-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152318" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605453" comment="libQt5PlatformHeaders-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152320" comment="libQt5PlatformHeaders-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605454" comment="libQt5PlatformSupport-devel-static-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152321" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605455" comment="libQt5PlatformSupport-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152323" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605456" comment="libQt5PrintSupport-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152326" comment="libQt5PrintSupport-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605457" comment="libQt5PrintSupport-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152328" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605458" comment="libQt5PrintSupport5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152329" comment="libQt5PrintSupport5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605459" comment="libQt5Sql-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152338" comment="libQt5Sql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605460" comment="libQt5Sql-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152340" comment="libQt5Sql-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605461" comment="libQt5Sql5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152341" comment="libQt5Sql5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605462" comment="libQt5Sql5-mysql-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152343" comment="libQt5Sql5-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605463" comment="libQt5Sql5-postgresql-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152345" comment="libQt5Sql5-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605464" comment="libQt5Sql5-sqlite-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152347" comment="libQt5Sql5-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605465" comment="libQt5Sql5-unixODBC-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152349" comment="libQt5Sql5-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605466" comment="libQt5Test-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152353" comment="libQt5Test-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605467" comment="libQt5Test-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152355" comment="libQt5Test-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605468" comment="libQt5Test5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152356" comment="libQt5Test5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605469" comment="libQt5Widgets-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152377" comment="libQt5Widgets-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605470" comment="libQt5Widgets-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152379" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605471" comment="libQt5Widgets5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152380" comment="libQt5Widgets5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605472" comment="libQt5Xml-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152384" comment="libQt5Xml-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605473" comment="libQt5Xml5-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152386" comment="libQt5Xml5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605258" comment="libqt4-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151228" comment="libqt4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605259" comment="libqt4-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151229" comment="libqt4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605260" comment="libqt4-devel-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151230" comment="libqt4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605261" comment="libqt4-devel-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230219" comment="libqt4-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605262" comment="libqt4-devel-doc-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230220" comment="libqt4-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605263" comment="libqt4-devel-doc-data-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230221" comment="libqt4-devel-doc-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605264" comment="libqt4-linguist-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151231" comment="libqt4-linguist is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605265" comment="libqt4-private-headers-devel-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230222" comment="libqt4-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605266" comment="libqt4-qt3support-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151232" comment="libqt4-qt3support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605267" comment="libqt4-qt3support-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151233" comment="libqt4-qt3support-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605268" comment="libqt4-sql-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151234" comment="libqt4-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605269" comment="libqt4-sql-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151235" comment="libqt4-sql-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605270" comment="libqt4-sql-postgresql-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151238" comment="libqt4-sql-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605271" comment="libqt4-sql-sqlite-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151240" comment="libqt4-sql-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605272" comment="libqt4-sql-sqlite-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151241" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605273" comment="libqt4-sql-unixODBC-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151242" comment="libqt4-sql-unixODBC is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605274" comment="libqt4-x11-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151244" comment="libqt4-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605275" comment="libqt4-x11-32bit-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151245" comment="libqt4-x11-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605474" comment="libqt5-qtbase-common-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152401" comment="libqt5-qtbase-common-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605475" comment="libqt5-qtbase-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152402" comment="libqt5-qtbase-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605476" comment="libqt5-qtbase-examples-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152404" comment="libqt5-qtbase-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605477" comment="libqt5-qtbase-platformtheme-gtk3-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177209" comment="libqt5-qtbase-platformtheme-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605478" comment="libqt5-qtbase-private-headers-devel-5.9.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152407" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605276" comment="qt4-x11-tools-4.8.7-lp151.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230226" comment="qt4-x11-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0467-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00006.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-08"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752</cve>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607364" comment="glibc-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607365" comment="glibc-32bit-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151369" comment="glibc-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607366" comment="glibc-devel-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607367" comment="glibc-devel-32bit-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152566" comment="glibc-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607368" comment="glibc-devel-static-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607369" comment="glibc-devel-static-32bit-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152568" comment="glibc-devel-static-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607370" comment="glibc-extra-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607371" comment="glibc-html-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607372" comment="glibc-i18ndata-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607373" comment="glibc-info-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607374" comment="glibc-locale-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607375" comment="glibc-locale-base-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607376" comment="glibc-locale-base-32bit-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251613" comment="glibc-locale-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607377" comment="glibc-profile-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607378" comment="glibc-profile-32bit-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152573" comment="glibc-profile-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607379" comment="glibc-utils-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607380" comment="glibc-utils-32bit-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152576" comment="glibc-utils-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607381" comment="nscd-2.26-lp151.19.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151375" comment="nscd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17527" ref_url="https://www.suse.com/security/cve/CVE-2020-17527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EA4UBW4STKIATR7VTJBCM2FBGG23C3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/633VPXBTLJ3ECQFTNOKFL457XMKHKZ32/" source="SUSE-SU"/>
    <description>
    While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17527/">CVE-2020-17527</cve>
	<bugzilla href="https://bugzilla.suse.com/1179602">SUSE bug 1179602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180830">SUSE bug 1180830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609598" comment="tomcat-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609599" comment="tomcat-admin-webapps-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609600" comment="tomcat-docs-webapp-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609601" comment="tomcat-el-3_0-api-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609602" comment="tomcat-embed-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609603" comment="tomcat-javadoc-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609604" comment="tomcat-jsp-2_3-api-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609605" comment="tomcat-jsvc-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609606" comment="tomcat-lib-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609607" comment="tomcat-servlet-4_0-api-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609608" comment="tomcat-webapps-9.0.36-lp151.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1759</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1759" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1759" ref_url="https://www.suse.com/security/cve/CVE-2020-1759" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00013.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-1759/">CVE-2020-1759</cve>
	<bugzilla href="https://bugzilla.suse.com/1166403">SUSE bug 1166403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607436" comment="ceph-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607437" comment="ceph-base-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607438" comment="ceph-common-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607439" comment="ceph-dashboard-e2e-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278214" comment="ceph-dashboard-e2e is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607440" comment="ceph-fuse-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607441" comment="ceph-grafana-dashboards-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607442" comment="ceph-mds-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607443" comment="ceph-mgr-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607444" comment="ceph-mgr-dashboard-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607445" comment="ceph-mgr-diskprediction-cloud-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607446" comment="ceph-mgr-diskprediction-local-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607447" comment="ceph-mgr-k8sevents-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607448" comment="ceph-mgr-rook-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607449" comment="ceph-mgr-ssh-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278221" comment="ceph-mgr-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607450" comment="ceph-mon-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607451" comment="ceph-osd-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607452" comment="ceph-prometheus-alerts-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607453" comment="ceph-radosgw-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607454" comment="ceph-resource-agents-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154235" comment="ceph-resource-agents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607455" comment="ceph-test-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607456" comment="cephfs-shell-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607457" comment="libcephfs-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607458" comment="libcephfs2-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607459" comment="librados-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607460" comment="librados2-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607461" comment="libradospp-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607462" comment="libradosstriper-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154241" comment="libradosstriper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607463" comment="libradosstriper1-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154242" comment="libradosstriper1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607464" comment="librbd-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607465" comment="librbd1-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607466" comment="librgw-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607467" comment="librgw2-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607468" comment="python3-ceph-argparse-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607469" comment="python3-cephfs-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607470" comment="python3-rados-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607471" comment="python3-rbd-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607472" comment="python3-rgw-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607473" comment="rados-objclass-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607474" comment="rbd-fuse-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607475" comment="rbd-mirror-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607476" comment="rbd-nbd-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1760" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1760" ref_url="https://www.suse.com/security/cve/CVE-2020-1760" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00013.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1760/">CVE-2020-1760</cve>
	<bugzilla href="https://bugzilla.suse.com/1166484">SUSE bug 1166484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607436" comment="ceph-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607437" comment="ceph-base-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607438" comment="ceph-common-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607439" comment="ceph-dashboard-e2e-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278214" comment="ceph-dashboard-e2e is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607440" comment="ceph-fuse-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607441" comment="ceph-grafana-dashboards-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607442" comment="ceph-mds-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607443" comment="ceph-mgr-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607444" comment="ceph-mgr-dashboard-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607445" comment="ceph-mgr-diskprediction-cloud-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607446" comment="ceph-mgr-diskprediction-local-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607447" comment="ceph-mgr-k8sevents-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607448" comment="ceph-mgr-rook-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607449" comment="ceph-mgr-ssh-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278221" comment="ceph-mgr-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607450" comment="ceph-mon-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607451" comment="ceph-osd-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607452" comment="ceph-prometheus-alerts-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607453" comment="ceph-radosgw-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607454" comment="ceph-resource-agents-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154235" comment="ceph-resource-agents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607455" comment="ceph-test-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607456" comment="cephfs-shell-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607457" comment="libcephfs-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607458" comment="libcephfs2-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607459" comment="librados-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607460" comment="librados2-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607461" comment="libradospp-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607462" comment="libradosstriper-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154241" comment="libradosstriper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607463" comment="libradosstriper1-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154242" comment="libradosstriper1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607464" comment="librbd-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607465" comment="librbd1-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607466" comment="librgw-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607467" comment="librgw2-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607468" comment="python3-ceph-argparse-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607469" comment="python3-cephfs-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607470" comment="python3-rados-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607471" comment="python3-rbd-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607472" comment="python3-rgw-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607473" comment="rados-objclass-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607474" comment="rbd-fuse-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607475" comment="rbd-mirror-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607476" comment="rbd-nbd-14.2.5.389+gb0f23ac248-lp151.2.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1765" ref_url="https://www.suse.com/security/cve/CVE-2020-1765" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1765/">CVE-2020-1765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1766</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1766" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1766" ref_url="https://www.suse.com/security/cve/CVE-2020-1766" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1766/">CVE-2020-1766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1769" ref_url="https://www.suse.com/security/cve/CVE-2020-1769" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    In the login screens (in agent and customer interface), Username and Password fields use autocomplete, which might be considered as security issue. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1769/">CVE-2020-1769</cve>
	<bugzilla href="https://bugzilla.suse.com/1168032">SUSE bug 1168032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1770</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1770" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1770" ref_url="https://www.suse.com/security/cve/CVE-2020-1770" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    Support bundle generated files could contain sensitive information that might be unwanted to be disclosed. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1770/">CVE-2020-1770</cve>
	<bugzilla href="https://bugzilla.suse.com/1168031">SUSE bug 1168031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1771" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1771" ref_url="https://www.suse.com/security/cve/CVE-2020-1771" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-16"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-1771/">CVE-2020-1771</cve>
	<bugzilla href="https://bugzilla.suse.com/1168030">SUSE bug 1168030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1772</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1772" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1772" ref_url="https://www.suse.com/security/cve/CVE-2020-1772" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1772/">CVE-2020-1772</cve>
	<bugzilla href="https://bugzilla.suse.com/1168029">SUSE bug 1168029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1773</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1773" ref_url="https://www.suse.com/security/cve/CVE-2020-1773" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" source="SUSE-SU"/>
    <description>
    An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1773/">CVE-2020-1773</cve>
	<bugzilla href="https://bugzilla.suse.com/1168028">SUSE bug 1168028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609723" comment="otrs-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154272" comment="otrs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609724" comment="otrs-doc-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154273" comment="otrs-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609725" comment="otrs-itsm-6.0.29-lp151.2.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154274" comment="otrs-itsm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1927</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927</cve>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607684" comment="apache2-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607685" comment="apache2-devel-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607686" comment="apache2-doc-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607687" comment="apache2-event-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607688" comment="apache2-example-pages-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607689" comment="apache2-prefork-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607690" comment="apache2-utils-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607691" comment="apache2-worker-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1930</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1930" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00003.html" source="SUSE-SU"/>
    <description>
    A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930</cve>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607338" comment="perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261407" comment="perl-Mail-SpamAssassin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607339" comment="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261408" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607340" comment="spamassassin-3.4.2-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261409" comment="spamassassin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1931</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1931" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00003.html" source="SUSE-SU"/>
    <description>
    A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931</cve>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607338" comment="perl-Mail-SpamAssassin-3.4.2-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261407" comment="perl-Mail-SpamAssassin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607339" comment="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261408" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607340" comment="spamassassin-3.4.2-lp151.8.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261409" comment="spamassassin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1934</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607684" comment="apache2-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607685" comment="apache2-devel-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607686" comment="apache2-doc-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607687" comment="apache2-event-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607688" comment="apache2-example-pages-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607689" comment="apache2-prefork-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607690" comment="apache2-utils-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607691" comment="apache2-worker-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html" source="SUSE-SU"/>
    <description>
    In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935</cve>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607134" comment="tomcat-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607135" comment="tomcat-admin-webapps-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607136" comment="tomcat-docs-webapp-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607137" comment="tomcat-el-3_0-api-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607138" comment="tomcat-embed-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607139" comment="tomcat-javadoc-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607140" comment="tomcat-jsp-2_3-api-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607141" comment="tomcat-jsvc-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607142" comment="tomcat-lib-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607143" comment="tomcat-servlet-4_0-api-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607144" comment="tomcat-webapps-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1938</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006719.html" source="SUSE-SU"/>
		<reference ref_id="TID000019606" ref_url="https://www.suse.com/support/kb/doc/?id=000019606" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html" source="SUSE-SU"/>
    <description>
    When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607684" comment="apache2-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607685" comment="apache2-devel-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607686" comment="apache2-doc-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607687" comment="apache2-event-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607688" comment="apache2-example-pages-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607689" comment="apache2-prefork-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607690" comment="apache2-utils-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607691" comment="apache2-worker-2.4.33-lp151.8.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607134" comment="tomcat-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607135" comment="tomcat-admin-webapps-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607136" comment="tomcat-docs-webapp-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607137" comment="tomcat-el-3_0-api-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607138" comment="tomcat-embed-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607139" comment="tomcat-javadoc-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607140" comment="tomcat-jsp-2_3-api-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607141" comment="tomcat-jsvc-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607142" comment="tomcat-lib-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607143" comment="tomcat-servlet-4_0-api-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607144" comment="tomcat-webapps-9.0.31-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202019667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-19667</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-19667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1967</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0945-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html" source="SUSE-SU"/>
    <description>
    Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967</cve>
	<bugzilla href="https://bugzilla.suse.com/1169407">SUSE bug 1169407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609172" comment="cargo-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265404" comment="cargo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609173" comment="cargo-doc-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265405" comment="cargo-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609174" comment="clippy-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265406" comment="clippy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609175" comment="rls-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265407" comment="rls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609176" comment="rust-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238244" comment="rust is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609177" comment="rust-analysis-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265408" comment="rust-analysis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609178" comment="rust-cbindgen-0.14.1-lp151.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265409" comment="rust-cbindgen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609179" comment="rust-doc-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238245" comment="rust-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609180" comment="rust-gdb-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238246" comment="rust-gdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609181" comment="rust-src-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238247" comment="rust-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609182" comment="rust-std-static-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265410" comment="rust-std-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609183" comment="rustfmt-1.43.1-lp151.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265411" comment="rustfmt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1971</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMYUDIGG7RM42AIH4Q3WW4VZGFRAPLQ7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YDLYD3JFZSOPG5DPXOHFTMZTUOLPOK5J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DET3T3KBOIXDZC2VZ5XGHXVGQ54LOAI5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2269-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGJECGZC6A7C36WKBWL3FKK6U7IGO4OK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
    <description>
    The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196179">SUSE bug 1196179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606760" comment="libopenssl-1_0_0-devel-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231070" comment="libopenssl-1_0_0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606761" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231071" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606733" comment="libopenssl-1_1-devel-1.1.0i-lp151.8.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606734" comment="libopenssl-1_1-devel-32bit-1.1.0i-lp151.8.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231073" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606762" comment="libopenssl10-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338634" comment="libopenssl10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606763" comment="libopenssl1_0_0-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151065" comment="libopenssl1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606764" comment="libopenssl1_0_0-32bit-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151066" comment="libopenssl1_0_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606765" comment="libopenssl1_0_0-hmac-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152704" comment="libopenssl1_0_0-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606766" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152705" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606767" comment="libopenssl1_0_0-steam-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171502" comment="libopenssl1_0_0-steam is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606768" comment="libopenssl1_0_0-steam-32bit-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009171503" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606735" comment="libopenssl1_1-1.1.0i-lp151.8.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606736" comment="libopenssl1_1-32bit-1.1.0i-lp151.8.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177121" comment="libopenssl1_1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606737" comment="libopenssl1_1-hmac-1.1.0i-lp151.8.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606738" comment="libopenssl1_1-hmac-32bit-1.1.0i-lp151.8.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231075" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609609" comment="nodejs10-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609610" comment="nodejs10-devel-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609611" comment="nodejs10-docs-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609612" comment="npm10-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606769" comment="openssl-1_0_0-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231076" comment="openssl-1_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606770" comment="openssl-1_0_0-cavs-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231077" comment="openssl-1_0_0-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606771" comment="openssl-1_0_0-doc-1.0.2p-lp151.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231078" comment="openssl-1_0_0-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606739" comment="openssl-1_1-1.1.0i-lp151.8.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606740" comment="openssl-1_1-doc-1.1.0i-lp151.8.12.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231079" comment="openssl-1_1-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0756-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00001.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608217" comment="qemu-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608218" comment="qemu-arm-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608219" comment="qemu-audio-alsa-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608220" comment="qemu-audio-oss-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608221" comment="qemu-audio-pa-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608222" comment="qemu-audio-sdl-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608223" comment="qemu-block-curl-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608224" comment="qemu-block-dmg-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608225" comment="qemu-block-gluster-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608226" comment="qemu-block-iscsi-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608227" comment="qemu-block-nfs-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608228" comment="qemu-block-rbd-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608229" comment="qemu-block-ssh-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608230" comment="qemu-extra-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608231" comment="qemu-guest-agent-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608232" comment="qemu-ipxe-1.0.0+-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608233" comment="qemu-ksm-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608234" comment="qemu-kvm-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608235" comment="qemu-lang-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608236" comment="qemu-linux-user-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608237" comment="qemu-ppc-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608238" comment="qemu-s390-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608239" comment="qemu-seabios-1.12.0-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608240" comment="qemu-sgabios-8-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608241" comment="qemu-tools-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608242" comment="qemu-ui-curses-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608243" comment="qemu-ui-gtk-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608244" comment="qemu-ui-sdl-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608245" comment="qemu-vgabios-1.12.0-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608246" comment="qemu-x86-3.1.1.1-lp151.7.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607871" comment="slirp4netns-0.4.5-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266793" comment="slirp4netns is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24368</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24368" ref_url="https://www.suse.com/security/cve/CVE-2020-24368" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00026.html" source="SUSE-SU"/>
    <description>
    Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24368/">CVE-2020-24368</cve>
	<bugzilla href="https://bugzilla.suse.com/1175530">SUSE bug 1175530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609923" comment="icingacli-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275965" comment="icingacli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609924" comment="icingaweb2-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275967" comment="icingaweb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609925" comment="icingaweb2-common-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275969" comment="icingaweb2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609926" comment="icingaweb2-vendor-HTMLPurifier-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275971" comment="icingaweb2-vendor-HTMLPurifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609927" comment="icingaweb2-vendor-JShrink-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275973" comment="icingaweb2-vendor-JShrink is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609928" comment="icingaweb2-vendor-Parsedown-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275975" comment="icingaweb2-vendor-Parsedown is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609929" comment="icingaweb2-vendor-dompdf-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275977" comment="icingaweb2-vendor-dompdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609930" comment="icingaweb2-vendor-lessphp-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275979" comment="icingaweb2-vendor-lessphp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609931" comment="icingaweb2-vendor-zf1-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275981" comment="icingaweb2-vendor-zf1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609932" comment="php-Icinga-2.7.4-lp151.6.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009275983" comment="php-Icinga is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24386</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLBPVUTTVOKCDH7OSMVSVIQEI7TKHOMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0072-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUR6FYAW4F7DJJAFNZ7FNLNEQNDU6ZEZ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users' email messages (and path disclosure).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386</cve>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609505" comment="dovecot23-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609506" comment="dovecot23-backend-mysql-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609507" comment="dovecot23-backend-pgsql-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609508" comment="dovecot23-backend-sqlite-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609509" comment="dovecot23-devel-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609510" comment="dovecot23-fts-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609511" comment="dovecot23-fts-lucene-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609512" comment="dovecot23-fts-solr-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609513" comment="dovecot23-fts-squat-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24394</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24394" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24394" ref_url="https://www.suse.com/security/cve/CVE-2020-24394" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24394/">CVE-2020-24394</cve>
	<bugzilla href="https://bugzilla.suse.com/1175518">SUSE bug 1175518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175992">SUSE bug 1175992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605046" comment="kernel-debug-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605047" comment="kernel-debug-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605048" comment="kernel-debug-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605049" comment="kernel-default-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605050" comment="kernel-default-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605051" comment="kernel-default-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605052" comment="kernel-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605053" comment="kernel-docs-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605054" comment="kernel-docs-html-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605055" comment="kernel-kvmsmall-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605056" comment="kernel-kvmsmall-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605057" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605058" comment="kernel-macros-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605059" comment="kernel-obs-build-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605060" comment="kernel-obs-qa-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605061" comment="kernel-source-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605062" comment="kernel-source-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605063" comment="kernel-syms-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605064" comment="kernel-vanilla-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605065" comment="kernel-vanilla-base-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605066" comment="kernel-vanilla-devel-4.12.14-lp151.28.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24553</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24553" ref_url="https://www.suse.com/security/cve/CVE-2020-24553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html" source="SUSE-SU"/>
    <description>
    Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24553/">CVE-2020-24553</cve>
	<bugzilla href="https://bugzilla.suse.com/1176031">SUSE bug 1176031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605482" comment="go1.14-1.14.9-lp151.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605483" comment="go1.14-doc-1.14.9-lp151.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605484" comment="go1.14-race-1.14.9-lp151.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24606</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24606" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606" source="SUSE CVE"/>
		<reference ref_id="GHSA-vvj7-xjgq-g2jg" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-vvj7-xjgq-g2jg" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-13"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605085" comment="squid-4.13-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24614</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24614" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24614" ref_url="https://www.suse.com/security/cve/CVE-2020-24614" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS65E7ITOHOY4RHXJ7DZFLWTUOAZFGZS/" source="SUSE-SU"/>
    <description>
    Fossil before 2.10.2, 2.11.x before 2.11.2, and 2.12.x before 2.12.1 allows remote authenticated users to execute arbitrary code. An attacker must have check-in privileges on the repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24614/">CVE-2020-24614</cve>
	<bugzilla href="https://bugzilla.suse.com/1175760">SUSE bug 1175760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609933" comment="fossil-2.12.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168274" comment="fossil is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24654" ref_url="https://www.suse.com/security/cve/CVE-2020-24654" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1310-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00046.html" source="SUSE-SU"/>
    <description>
    In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24654/">CVE-2020-24654</cve>
	<bugzilla href="https://bugzilla.suse.com/1175857">SUSE bug 1175857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609934" comment="ark-18.12.3-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154016" comment="ark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609935" comment="ark-lang-18.12.3-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289271" comment="ark-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609936" comment="libkerfuffle18-18.12.3-lp151.2.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289272" comment="libkerfuffle18 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24659" ref_url="https://www.suse.com/security/cve/CVE-2020-24659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24659/">CVE-2020-24659</cve>
	<bugzilla href="https://bugzilla.suse.com/1176181">SUSE bug 1176181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178057">SUSE bug 1178057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605697" comment="gnutls-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605698" comment="gnutls-guile-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235743" comment="gnutls-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605699" comment="libgnutls-dane-devel-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235744" comment="libgnutls-dane-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605700" comment="libgnutls-dane0-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177127" comment="libgnutls-dane0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605701" comment="libgnutls-devel-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605702" comment="libgnutls-devel-32bit-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153803" comment="libgnutls-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605703" comment="libgnutls30-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605704" comment="libgnutls30-32bit-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235745" comment="libgnutls30-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605705" comment="libgnutls30-hmac-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605706" comment="libgnutls30-hmac-32bit-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281489" comment="libgnutls30-hmac-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605707" comment="libgnutlsxx-devel-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605708" comment="libgnutlsxx28-3.6.7-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153806" comment="libgnutlsxx28 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24972</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24972" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24972" ref_url="https://www.suse.com/security/cve/CVE-2020-24972" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1754-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00064.html" source="SUSE-SU"/>
    <description>
    The Kleopatra component before 3.1.12 (and before 20.07.80) for GnuPG allows remote attackers to execute arbitrary code because openpgp4fpr: URLs are supported without safe handling of command-line options. The Qt platformpluginpath command-line option can be used to load an arbitrary DLL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24972/">CVE-2020-24972</cve>
	<bugzilla href="https://bugzilla.suse.com/1177932">SUSE bug 1177932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605695" comment="kleopatra-18.12.3-lp151.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296734" comment="kleopatra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605696" comment="kleopatra-lang-18.12.3-lp151.2.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296735" comment="kleopatra-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24977</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1465-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html" source="SUSE-SU"/>
    <description>
    GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605250" comment="libxml2-2-2.9.7-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605251" comment="libxml2-2-32bit-2.9.7-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605252" comment="libxml2-devel-2.9.7-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605253" comment="libxml2-devel-32bit-2.9.7-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605254" comment="libxml2-doc-2.9.7-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605255" comment="libxml2-tools-2.9.7-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605256" comment="python2-libxml2-python-2.9.7-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605257" comment="python3-libxml2-python-2.9.7-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25032</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25032" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25032" ref_url="https://www.suse.com/security/cve/CVE-2020-25032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25032/">CVE-2020-25032</cve>
	<bugzilla href="https://bugzilla.suse.com/1175986">SUSE bug 1175986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609937" comment="python2-Flask-Cors-3.0.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009292844" comment="python2-Flask-Cors is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609938" comment="python3-Flask-Cors-3.0.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009292846" comment="python3-Flask-Cors is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25039" ref_url="https://www.suse.com/security/cve/CVE-2020-25039" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1529-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00243.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity 3.2.0 through 3.6.2 has Insecure Permissions on temporary directories used in fakeroot or user namespace container execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25039/">CVE-2020-25039</cve>
	<bugzilla href="https://bugzilla.suse.com/1176705">SUSE bug 1176705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176707">SUSE bug 1176707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609939" comment="singularity-3.6.3-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25040</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25040" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25040" ref_url="https://www.suse.com/security/cve/CVE-2020-25040" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1529-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00243.html" source="SUSE-SU"/>
    <description>
    Sylabs Singularity through 3.6.2 has Insecure Permissions on temporary directories used in explicit and implicit container build operations, a different vulnerability than CVE-2020-25039.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25040/">CVE-2020-25040</cve>
	<bugzilla href="https://bugzilla.suse.com/1176707">SUSE bug 1176707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609939" comment="singularity-3.6.3-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238040" comment="singularity is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25212</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605559" comment="kernel-debug-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605560" comment="kernel-debug-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605561" comment="kernel-debug-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605562" comment="kernel-default-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605563" comment="kernel-default-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605564" comment="kernel-default-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605565" comment="kernel-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605566" comment="kernel-docs-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605567" comment="kernel-docs-html-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605568" comment="kernel-kvmsmall-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605571" comment="kernel-macros-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605572" comment="kernel-obs-build-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605573" comment="kernel-obs-qa-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605574" comment="kernel-source-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605575" comment="kernel-source-vanilla-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605576" comment="kernel-syms-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605577" comment="kernel-vanilla-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605578" comment="kernel-vanilla-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605579" comment="kernel-vanilla-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25219</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25219" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1676-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html" source="SUSE-SU"/>
    <description>
    url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605545" comment="libproxy-devel-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151761" comment="libproxy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605546" comment="libproxy-sharp-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295954" comment="libproxy-sharp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605547" comment="libproxy-tools-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295955" comment="libproxy-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605548" comment="libproxy1-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151762" comment="libproxy1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605549" comment="libproxy1-32bit-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295956" comment="libproxy1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605550" comment="libproxy1-config-gnome3-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151763" comment="libproxy1-config-gnome3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605551" comment="libproxy1-config-kde-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154112" comment="libproxy1-config-kde is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605552" comment="libproxy1-networkmanager-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151765" comment="libproxy1-networkmanager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605553" comment="libproxy1-pacrunner-webkit-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151766" comment="libproxy1-pacrunner-webkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605554" comment="perl-Net-Libproxy-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295957" comment="perl-Net-Libproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605555" comment="python-libproxy-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295958" comment="python-libproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605556" comment="python3-libproxy-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295959" comment="python3-libproxy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25275</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25275" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25275" ref_url="https://www.suse.com/security/cve/CVE-2020-25275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLBPVUTTVOKCDH7OSMVSVIQEI7TKHOMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0072-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUR6FYAW4F7DJJAFNZ7FNLNEQNDU6ZEZ/" source="SUSE-SU"/>
    <description>
    Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25275/">CVE-2020-25275</cve>
	<bugzilla href="https://bugzilla.suse.com/1180406">SUSE bug 1180406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609505" comment="dovecot23-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245304" comment="dovecot23 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609506" comment="dovecot23-backend-mysql-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245305" comment="dovecot23-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609507" comment="dovecot23-backend-pgsql-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245306" comment="dovecot23-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609508" comment="dovecot23-backend-sqlite-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245307" comment="dovecot23-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609509" comment="dovecot23-devel-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245308" comment="dovecot23-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609510" comment="dovecot23-fts-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245309" comment="dovecot23-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609511" comment="dovecot23-fts-lucene-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245310" comment="dovecot23-fts-lucene is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609512" comment="dovecot23-fts-solr-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245311" comment="dovecot23-fts-solr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609513" comment="dovecot23-fts-squat-2.3.11.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245312" comment="dovecot23-fts-squat is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25285</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606106" comment="kernel-debug-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606107" comment="kernel-debug-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606108" comment="kernel-debug-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606109" comment="kernel-default-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606110" comment="kernel-default-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606111" comment="kernel-default-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606112" comment="kernel-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606113" comment="kernel-docs-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606114" comment="kernel-docs-html-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606115" comment="kernel-kvmsmall-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606116" comment="kernel-kvmsmall-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606117" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606118" comment="kernel-macros-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606119" comment="kernel-obs-build-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606120" comment="kernel-obs-qa-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606121" comment="kernel-source-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606122" comment="kernel-source-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606123" comment="kernel-syms-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606124" comment="kernel-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606125" comment="kernel-vanilla-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606126" comment="kernel-vanilla-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25592</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25592" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="TID000019775" ref_url="https://www.suse.com/support/kb/doc/?id=000019775" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-30"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606027" comment="python2-salt-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174859" comment="python2-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606028" comment="python3-salt-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606029" comment="salt-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606030" comment="salt-api-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606031" comment="salt-bash-completion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606032" comment="salt-cloud-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606033" comment="salt-doc-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606034" comment="salt-fish-completion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606035" comment="salt-master-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606036" comment="salt-minion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606037" comment="salt-proxy-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606038" comment="salt-ssh-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606039" comment="salt-standalone-formulas-configuration-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606040" comment="salt-syndic-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606041" comment="salt-zsh-completion-3000-lp151.5.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25637</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html" source="SUSE-SU"/>
    <description>
    A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605805" comment="libvirt-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605806" comment="libvirt-admin-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166268" comment="libvirt-admin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605807" comment="libvirt-bash-completion-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266806" comment="libvirt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605808" comment="libvirt-client-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605809" comment="libvirt-daemon-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605810" comment="libvirt-daemon-config-network-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605811" comment="libvirt-daemon-config-nwfilter-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605812" comment="libvirt-daemon-driver-interface-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605813" comment="libvirt-daemon-driver-libxl-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151429" comment="libvirt-daemon-driver-libxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605814" comment="libvirt-daemon-driver-lxc-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151430" comment="libvirt-daemon-driver-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605815" comment="libvirt-daemon-driver-network-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605816" comment="libvirt-daemon-driver-nodedev-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605817" comment="libvirt-daemon-driver-nwfilter-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605818" comment="libvirt-daemon-driver-qemu-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605819" comment="libvirt-daemon-driver-secret-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605820" comment="libvirt-daemon-driver-storage-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605821" comment="libvirt-daemon-driver-storage-core-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605822" comment="libvirt-daemon-driver-storage-disk-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605823" comment="libvirt-daemon-driver-storage-gluster-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266807" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605824" comment="libvirt-daemon-driver-storage-iscsi-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605825" comment="libvirt-daemon-driver-storage-logical-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605826" comment="libvirt-daemon-driver-storage-mpath-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605827" comment="libvirt-daemon-driver-storage-rbd-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605828" comment="libvirt-daemon-driver-storage-scsi-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605829" comment="libvirt-daemon-hooks-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605830" comment="libvirt-daemon-lxc-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151439" comment="libvirt-daemon-lxc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605831" comment="libvirt-daemon-qemu-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605832" comment="libvirt-daemon-xen-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151441" comment="libvirt-daemon-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605833" comment="libvirt-devel-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605834" comment="libvirt-doc-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605835" comment="libvirt-libs-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605836" comment="libvirt-lock-sanlock-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152994" comment="libvirt-lock-sanlock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605837" comment="libvirt-nss-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605838" comment="wireshark-plugin-libvirt-5.1.0-lp151.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25639</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25639" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25641</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25641" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25643</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25645</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25645" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605559" comment="kernel-debug-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605560" comment="kernel-debug-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605561" comment="kernel-debug-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605562" comment="kernel-default-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605563" comment="kernel-default-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605564" comment="kernel-default-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605565" comment="kernel-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605566" comment="kernel-docs-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605567" comment="kernel-docs-html-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605568" comment="kernel-kvmsmall-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605571" comment="kernel-macros-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605572" comment="kernel-obs-build-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605573" comment="kernel-obs-qa-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605574" comment="kernel-source-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605575" comment="kernel-source-vanilla-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605576" comment="kernel-syms-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605577" comment="kernel-vanilla-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605578" comment="kernel-vanilla-base-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605579" comment="kernel-vanilla-devel-4.12.14-lp151.28.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25654" ref_url="https://www.suse.com/security/cve/CVE-2020-25654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00015.html" source="SUSE-SU"/>
    <description>
    An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25654/">CVE-2020-25654</cve>
	<bugzilla href="https://bugzilla.suse.com/1173668">SUSE bug 1173668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177916">SUSE bug 1177916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196165">SUSE bug 1196165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605972" comment="libpacemaker-devel-2.0.1+20190417.13d370ca9-lp151.2.16.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153792" comment="libpacemaker-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605973" comment="libpacemaker3-2.0.1+20190417.13d370ca9-lp151.2.16.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153793" comment="libpacemaker3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605974" comment="pacemaker-2.0.1+20190417.13d370ca9-lp151.2.16.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153794" comment="pacemaker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605975" comment="pacemaker-cli-2.0.1+20190417.13d370ca9-lp151.2.16.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153795" comment="pacemaker-cli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605976" comment="pacemaker-cts-2.0.1+20190417.13d370ca9-lp151.2.16.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153796" comment="pacemaker-cts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605977" comment="pacemaker-remote-2.0.1+20190417.13d370ca9-lp151.2.16.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153797" comment="pacemaker-remote is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25656</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606106" comment="kernel-debug-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606107" comment="kernel-debug-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606108" comment="kernel-debug-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606109" comment="kernel-default-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606110" comment="kernel-default-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606111" comment="kernel-default-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606112" comment="kernel-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606113" comment="kernel-docs-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606114" comment="kernel-docs-html-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606115" comment="kernel-kvmsmall-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606116" comment="kernel-kvmsmall-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606117" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606118" comment="kernel-macros-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606119" comment="kernel-obs-build-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606120" comment="kernel-obs-qa-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606121" comment="kernel-source-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606122" comment="kernel-source-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606123" comment="kernel-syms-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606124" comment="kernel-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606125" comment="kernel-vanilla-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606126" comment="kernel-vanilla-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25660</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25660" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25660" ref_url="https://www.suse.com/security/cve/CVE-2020-25660" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3473-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYSOMAWYA2XHVHZ46F322TCUWNWMG4GU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWM64T57Y7IVDW2JWVLZSHPUKMYGWGAH/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25660/">CVE-2020-25660</cve>
	<bugzilla href="https://bugzilla.suse.com/1177843">SUSE bug 1177843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606349" comment="ceph-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606350" comment="ceph-base-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606351" comment="ceph-common-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606352" comment="ceph-dashboard-e2e-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278214" comment="ceph-dashboard-e2e is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606353" comment="ceph-fuse-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606354" comment="ceph-grafana-dashboards-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606355" comment="ceph-mds-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606356" comment="ceph-mgr-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606357" comment="ceph-mgr-dashboard-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606358" comment="ceph-mgr-diskprediction-cloud-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606359" comment="ceph-mgr-diskprediction-local-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606360" comment="ceph-mgr-k8sevents-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606361" comment="ceph-mgr-rook-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606362" comment="ceph-mgr-ssh-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278221" comment="ceph-mgr-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606363" comment="ceph-mon-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606364" comment="ceph-osd-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606365" comment="ceph-prometheus-alerts-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606366" comment="ceph-radosgw-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606367" comment="ceph-resource-agents-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154235" comment="ceph-resource-agents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606368" comment="ceph-test-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606369" comment="cephfs-shell-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606370" comment="libcephfs-devel-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606371" comment="libcephfs2-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606372" comment="librados-devel-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606373" comment="librados2-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606374" comment="libradospp-devel-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606375" comment="libradosstriper-devel-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154241" comment="libradosstriper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606376" comment="libradosstriper1-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154242" comment="libradosstriper1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606377" comment="librbd-devel-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606378" comment="librbd1-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606379" comment="librgw-devel-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606380" comment="librgw2-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606381" comment="python3-ceph-argparse-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606382" comment="python3-cephfs-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606383" comment="python3-rados-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606384" comment="python3-rbd-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606385" comment="python3-rgw-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606386" comment="rados-objclass-devel-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606387" comment="rbd-fuse-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606388" comment="rbd-mirror-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606389" comment="rbd-nbd-14.2.13.450+g65ea1b614d-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25664</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick versions prior to 6.9.10-68 and 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25665</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25666</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25668</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25668" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606106" comment="kernel-debug-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606107" comment="kernel-debug-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606108" comment="kernel-debug-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606109" comment="kernel-default-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606110" comment="kernel-default-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606111" comment="kernel-default-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606112" comment="kernel-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606113" comment="kernel-docs-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606114" comment="kernel-docs-html-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606115" comment="kernel-kvmsmall-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606116" comment="kernel-kvmsmall-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606117" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606118" comment="kernel-macros-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606119" comment="kernel-obs-build-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606120" comment="kernel-obs-qa-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606121" comment="kernel-source-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606122" comment="kernel-source-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606123" comment="kernel-syms-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606124" comment="kernel-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606125" comment="kernel-vanilla-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606126" comment="kernel-vanilla-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25669</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25669" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606291" comment="kernel-debug-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606292" comment="kernel-debug-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606293" comment="kernel-debug-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606294" comment="kernel-default-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606295" comment="kernel-default-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606296" comment="kernel-default-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606297" comment="kernel-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606298" comment="kernel-docs-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606299" comment="kernel-docs-html-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606300" comment="kernel-kvmsmall-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606301" comment="kernel-kvmsmall-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606302" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606303" comment="kernel-macros-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606304" comment="kernel-obs-build-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606305" comment="kernel-obs-qa-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606306" comment="kernel-source-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606307" comment="kernel-source-vanilla-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606308" comment="kernel-syms-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606309" comment="kernel-vanilla-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606310" comment="kernel-vanilla-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606311" comment="kernel-vanilla-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25675</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25676</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25681</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25681" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609434" comment="dnsmasq-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609435" comment="dnsmasq-utils-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25682</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25682" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609434" comment="dnsmasq-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609435" comment="dnsmasq-utils-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25683</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609434" comment="dnsmasq-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609435" comment="dnsmasq-utils-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25684</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25684" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609434" comment="dnsmasq-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609435" comment="dnsmasq-utils-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25685</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25685" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609434" comment="dnsmasq-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609435" comment="dnsmasq-utils-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25686</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25686" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the "Birthday Attacks" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609434" comment="dnsmasq-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609435" comment="dnsmasq-utils-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25687</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25687" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609434" comment="dnsmasq-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609435" comment="dnsmasq-utils-2.78-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153255" comment="dnsmasq-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25690</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25690" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25690" ref_url="https://www.suse.com/security/cve/CVE-2020-25690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZUXEDXI4LMNYPGQ23AHUPAFPEN5QAEZM/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in FontForge in versions before 20200314 while parsing SFD files containing certain LayerCount tokens. This flaw allows an attacker to manipulate the memory allocated on the heap, causing the application to crash or execute arbitrary code. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25690/">CVE-2020-25690</cve>
	<bugzilla href="https://bugzilla.suse.com/1178308">SUSE bug 1178308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606512" comment="fontforge-20170731-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276598" comment="fontforge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606513" comment="fontforge-devel-20170731-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276599" comment="fontforge-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606514" comment="fontforge-doc-20170731-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276600" comment="fontforge-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25692</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007764.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3VC65YBN4WMTACGDQE7SGD2ZBAJBKS3O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1920-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5OV5ACOVPOXU3LAYTZRU6RI5XRK4L6W/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606139" comment="libldap-2_4-2-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606140" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606141" comment="libldap-data-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606142" comment="openldap2-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606143" comment="openldap2-back-meta-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606144" comment="openldap2-back-perl-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606145" comment="openldap2-back-sock-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606146" comment="openldap2-back-sql-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606147" comment="openldap2-client-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606148" comment="openldap2-contrib-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606149" comment="openldap2-devel-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606150" comment="openldap2-devel-32bit-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606151" comment="openldap2-devel-static-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606152" comment="openldap2-doc-2.4.46-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606153" comment="openldap2-ppolicy-check-password-1.2-lp151.10.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25694</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606239" comment="libecpg6-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606240" comment="libpq5-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606230" comment="postgresql10-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606231" comment="postgresql10-contrib-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606232" comment="postgresql10-devel-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606233" comment="postgresql10-docs-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606234" comment="postgresql10-plperl-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606235" comment="postgresql10-plpython-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606236" comment="postgresql10-pltcl-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606237" comment="postgresql10-server-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606238" comment="postgresql10-test-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606241" comment="postgresql12-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606242" comment="postgresql12-contrib-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606243" comment="postgresql12-devel-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606244" comment="postgresql12-docs-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606245" comment="postgresql12-llvmjit-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606246" comment="postgresql12-plperl-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606247" comment="postgresql12-plpython-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606248" comment="postgresql12-pltcl-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606249" comment="postgresql12-server-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606250" comment="postgresql12-server-devel-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606251" comment="postgresql12-test-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606239" comment="libecpg6-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606240" comment="libpq5-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606230" comment="postgresql10-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606231" comment="postgresql10-contrib-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606232" comment="postgresql10-devel-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606233" comment="postgresql10-docs-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606234" comment="postgresql10-plperl-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606235" comment="postgresql10-plpython-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606236" comment="postgresql10-pltcl-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606237" comment="postgresql10-server-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606238" comment="postgresql10-test-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606241" comment="postgresql12-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606242" comment="postgresql12-contrib-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606243" comment="postgresql12-devel-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606244" comment="postgresql12-docs-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606245" comment="postgresql12-llvmjit-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606246" comment="postgresql12-plperl-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606247" comment="postgresql12-plpython-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606248" comment="postgresql12-pltcl-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606249" comment="postgresql12-server-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606250" comment="postgresql12-server-devel-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606251" comment="postgresql12-test-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
    <description>
    A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating system account running psql. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606239" comment="libecpg6-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606240" comment="libpq5-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606230" comment="postgresql10-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177238" comment="postgresql10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606231" comment="postgresql10-contrib-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233996" comment="postgresql10-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606232" comment="postgresql10-devel-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233997" comment="postgresql10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606233" comment="postgresql10-docs-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233998" comment="postgresql10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606234" comment="postgresql10-plperl-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233999" comment="postgresql10-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606235" comment="postgresql10-plpython-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234000" comment="postgresql10-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606236" comment="postgresql10-pltcl-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234001" comment="postgresql10-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606237" comment="postgresql10-server-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177239" comment="postgresql10-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606238" comment="postgresql10-test-10.15-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234002" comment="postgresql10-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606241" comment="postgresql12-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289726" comment="postgresql12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606242" comment="postgresql12-contrib-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289727" comment="postgresql12-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606243" comment="postgresql12-devel-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289728" comment="postgresql12-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606244" comment="postgresql12-docs-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289729" comment="postgresql12-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606245" comment="postgresql12-llvmjit-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289730" comment="postgresql12-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606246" comment="postgresql12-plperl-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289731" comment="postgresql12-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606247" comment="postgresql12-plpython-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289732" comment="postgresql12-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606248" comment="postgresql12-pltcl-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289733" comment="postgresql12-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606249" comment="postgresql12-server-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289734" comment="postgresql12-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606250" comment="postgresql12-server-devel-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289735" comment="postgresql12-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606251" comment="postgresql12-test-12.5-lp151.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289736" comment="postgresql12-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25704</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606291" comment="kernel-debug-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606292" comment="kernel-debug-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606293" comment="kernel-debug-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606294" comment="kernel-default-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606295" comment="kernel-default-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606296" comment="kernel-default-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606297" comment="kernel-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606298" comment="kernel-docs-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606299" comment="kernel-docs-html-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606300" comment="kernel-kvmsmall-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606301" comment="kernel-kvmsmall-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606302" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606303" comment="kernel-macros-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606304" comment="kernel-obs-build-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606305" comment="kernel-obs-qa-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606306" comment="kernel-source-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606307" comment="kernel-source-vanilla-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606308" comment="kernel-syms-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606309" comment="kernel-vanilla-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606310" comment="kernel-vanilla-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606311" comment="kernel-vanilla-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25705</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25705" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705" source="SUSE CVE"/>
		<reference ref_id="SADDNS-BLOG" ref_url="https://www.suse.com/c/suse-releases-fix-for-saddns-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="TID000019786" ref_url="https://www.suse.com/support/kb/doc/?id=000019786" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606291" comment="kernel-debug-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606292" comment="kernel-debug-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606293" comment="kernel-debug-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606294" comment="kernel-default-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606295" comment="kernel-default-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606296" comment="kernel-default-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606297" comment="kernel-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606298" comment="kernel-docs-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606299" comment="kernel-docs-html-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606300" comment="kernel-kvmsmall-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606301" comment="kernel-kvmsmall-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606302" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606303" comment="kernel-macros-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606304" comment="kernel-obs-build-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606305" comment="kernel-obs-qa-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606306" comment="kernel-source-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606307" comment="kernel-source-vanilla-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606308" comment="kernel-syms-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606309" comment="kernel-vanilla-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606310" comment="kernel-vanilla-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606311" comment="kernel-vanilla-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25708</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25708" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE5HT53OIOVH6753LHKM4XRKGN6GM3K6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WZC6Q36DSCUZTCIKGNLVYAKNWAL4N775/" source="SUSE-SU"/>
    <description>
    A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606499" comment="LibVNCServer-devel-0.9.10-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152205" comment="LibVNCServer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606500" comment="libvncclient0-0.9.10-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152206" comment="libvncclient0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606501" comment="libvncserver0-0.9.10-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152207" comment="libvncserver0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25709</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609413" comment="libldap-2_4-2-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609414" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609415" comment="libldap-data-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609416" comment="openldap2-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609417" comment="openldap2-back-meta-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609418" comment="openldap2-back-perl-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609419" comment="openldap2-back-sock-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609420" comment="openldap2-back-sql-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609421" comment="openldap2-client-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609422" comment="openldap2-contrib-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609423" comment="openldap2-devel-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609424" comment="openldap2-devel-32bit-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609425" comment="openldap2-devel-static-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609426" comment="openldap2-doc-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609427" comment="openldap2-ppolicy-check-password-1.2-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25710</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609413" comment="libldap-2_4-2-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609414" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609415" comment="libldap-data-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609416" comment="openldap2-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609417" comment="openldap2-back-meta-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609418" comment="openldap2-back-perl-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609419" comment="openldap2-back-sock-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609420" comment="openldap2-back-sql-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609421" comment="openldap2-client-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609422" comment="openldap2-contrib-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609423" comment="openldap2-devel-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609424" comment="openldap2-devel-32bit-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609425" comment="openldap2-devel-static-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609426" comment="openldap2-doc-2.4.46-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609427" comment="openldap2-ppolicy-check-password-1.2-lp151.10.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25712</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4SY5GPVDDNTXYVZ6YALLHT7B5RVDBJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJUVPABDGLSKQJMNPJUJBYOQTIDGD67K/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606650" comment="xorg-x11-server-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606651" comment="xorg-x11-server-extra-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606652" comment="xorg-x11-server-sdk-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606653" comment="xorg-x11-server-source-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606654" comment="xorg-x11-server-wayland-1.20.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177168" comment="xorg-x11-server-wayland is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2574</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574</cve>
	<bugzilla href="https://bugzilla.suse.com/1161085">SUSE bug 1161085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162388">SUSE bug 1162388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606995" comment="libmysqld-devel-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606996" comment="libmysqld19-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606997" comment="mariadb-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606998" comment="mariadb-bench-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606999" comment="mariadb-client-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607000" comment="mariadb-errormessages-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607001" comment="mariadb-galera-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607002" comment="mariadb-test-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607003" comment="mariadb-tools-10.2.31-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25829</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25829" ref_url="https://www.suse.com/security/cve/CVE-2020-25829" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25829/">CVE-2020-25829</cve>
	<bugzilla href="https://bugzilla.suse.com/1177383">SUSE bug 1177383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609862" comment="pdns-recursor-4.1.12-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153799" comment="pdns-recursor is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2583</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604468" comment="java-11-openjdk-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604469" comment="java-11-openjdk-accessibility-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604470" comment="java-11-openjdk-demo-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604471" comment="java-11-openjdk-devel-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604472" comment="java-11-openjdk-headless-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604473" comment="java-11-openjdk-javadoc-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604474" comment="java-11-openjdk-jmods-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604475" comment="java-11-openjdk-src-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605277" comment="java-1_8_0-openjdk-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605278" comment="java-1_8_0-openjdk-accessibility-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605279" comment="java-1_8_0-openjdk-demo-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605280" comment="java-1_8_0-openjdk-devel-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605281" comment="java-1_8_0-openjdk-headless-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605282" comment="java-1_8_0-openjdk-javadoc-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605283" comment="java-1_8_0-openjdk-src-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25862" ref_url="https://www.suse.com/security/cve/CVE-2020-25862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25862/">CVE-2020-25862</cve>
	<bugzilla href="https://bugzilla.suse.com/1176909">SUSE bug 1176909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606098" comment="libwireshark13-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606099" comment="libwiretap10-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606100" comment="libwsutil11-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606101" comment="wireshark-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606102" comment="wireshark-devel-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606103" comment="wireshark-ui-qt-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25863</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25863" ref_url="https://www.suse.com/security/cve/CVE-2020-25863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the MIME Multipart dissector could crash. This was addressed in epan/dissectors/packet-multipart.c by correcting the deallocation of invalid MIME parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25863/">CVE-2020-25863</cve>
	<bugzilla href="https://bugzilla.suse.com/1176908">SUSE bug 1176908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606098" comment="libwireshark13-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606099" comment="libwiretap10-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606100" comment="libwsutil11-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606101" comment="wireshark-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606102" comment="wireshark-devel-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606103" comment="wireshark-ui-qt-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25866</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25866" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25866" ref_url="https://www.suse.com/security/cve/CVE-2020-25866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25866/">CVE-2020-25866</cve>
	<bugzilla href="https://bugzilla.suse.com/1176910">SUSE bug 1176910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606098" comment="libwireshark13-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606099" comment="libwiretap10-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606100" comment="libwsutil11-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606101" comment="wireshark-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606102" comment="wireshark-devel-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606103" comment="wireshark-ui-qt-3.2.7-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2590</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604468" comment="java-11-openjdk-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604469" comment="java-11-openjdk-accessibility-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604470" comment="java-11-openjdk-demo-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604471" comment="java-11-openjdk-devel-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604472" comment="java-11-openjdk-headless-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604473" comment="java-11-openjdk-javadoc-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604474" comment="java-11-openjdk-jmods-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604475" comment="java-11-openjdk-src-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605277" comment="java-1_8_0-openjdk-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605278" comment="java-1_8_0-openjdk-accessibility-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605279" comment="java-1_8_0-openjdk-demo-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605280" comment="java-1_8_0-openjdk-devel-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605281" comment="java-1_8_0-openjdk-headless-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605282" comment="java-1_8_0-openjdk-javadoc-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605283" comment="java-1_8_0-openjdk-src-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2593</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604468" comment="java-11-openjdk-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604469" comment="java-11-openjdk-accessibility-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604470" comment="java-11-openjdk-demo-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604471" comment="java-11-openjdk-devel-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604472" comment="java-11-openjdk-headless-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604473" comment="java-11-openjdk-javadoc-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604474" comment="java-11-openjdk-jmods-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604475" comment="java-11-openjdk-src-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605277" comment="java-1_8_0-openjdk-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605278" comment="java-1_8_0-openjdk-accessibility-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605279" comment="java-1_8_0-openjdk-demo-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605280" comment="java-1_8_0-openjdk-devel-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605281" comment="java-1_8_0-openjdk-headless-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605282" comment="java-1_8_0-openjdk-javadoc-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605283" comment="java-1_8_0-openjdk-src-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2601</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604468" comment="java-11-openjdk-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604469" comment="java-11-openjdk-accessibility-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604470" comment="java-11-openjdk-demo-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604471" comment="java-11-openjdk-devel-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604472" comment="java-11-openjdk-headless-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604473" comment="java-11-openjdk-javadoc-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604474" comment="java-11-openjdk-jmods-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604475" comment="java-11-openjdk-src-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605277" comment="java-1_8_0-openjdk-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605278" comment="java-1_8_0-openjdk-accessibility-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605279" comment="java-1_8_0-openjdk-demo-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605280" comment="java-1_8_0-openjdk-devel-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605281" comment="java-1_8_0-openjdk-headless-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605282" comment="java-1_8_0-openjdk-javadoc-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605283" comment="java-1_8_0-openjdk-src-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2604</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604468" comment="java-11-openjdk-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604469" comment="java-11-openjdk-accessibility-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604470" comment="java-11-openjdk-demo-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604471" comment="java-11-openjdk-devel-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604472" comment="java-11-openjdk-headless-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604473" comment="java-11-openjdk-javadoc-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604474" comment="java-11-openjdk-jmods-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604475" comment="java-11-openjdk-src-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605277" comment="java-1_8_0-openjdk-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605278" comment="java-1_8_0-openjdk-accessibility-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605279" comment="java-1_8_0-openjdk-demo-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605280" comment="java-1_8_0-openjdk-devel-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605281" comment="java-1_8_0-openjdk-headless-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605282" comment="java-1_8_0-openjdk-javadoc-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605283" comment="java-1_8_0-openjdk-src-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26088</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26088" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605510" comment="kernel-debug-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605511" comment="kernel-debug-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605512" comment="kernel-debug-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605513" comment="kernel-default-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605514" comment="kernel-default-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605515" comment="kernel-default-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605516" comment="kernel-devel-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605517" comment="kernel-docs-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605518" comment="kernel-docs-html-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605519" comment="kernel-kvmsmall-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605520" comment="kernel-kvmsmall-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605521" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605522" comment="kernel-macros-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605523" comment="kernel-obs-build-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605524" comment="kernel-obs-qa-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605525" comment="kernel-source-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605526" comment="kernel-source-vanilla-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605527" comment="kernel-syms-4.12.14-lp151.28.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605528" comment="kernel-vanilla-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605529" comment="kernel-vanilla-base-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605530" comment="kernel-vanilla-devel-4.12.14-lp151.28.71.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26116</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008345.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQJZUPSO3MIAIYJBX2VTZETYQSLUJQPN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192361">SUSE bug 1192361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606012" comment="libpython2_7-1_0-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151571" comment="libpython2_7-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606013" comment="libpython2_7-1_0-32bit-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151572" comment="libpython2_7-1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606883" comment="libpython3_6m1_0-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606884" comment="libpython3_6m1_0-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606014" comment="python-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151913" comment="python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606015" comment="python-32bit-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153290" comment="python-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606016" comment="python-base-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151573" comment="python-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606017" comment="python-base-32bit-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153291" comment="python-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606018" comment="python-curses-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151914" comment="python-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606019" comment="python-demo-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153292" comment="python-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606020" comment="python-devel-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151574" comment="python-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606021" comment="python-doc-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153293" comment="python-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606022" comment="python-doc-pdf-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153294" comment="python-doc-pdf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606023" comment="python-gdbm-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151915" comment="python-gdbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606024" comment="python-idle-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153295" comment="python-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606025" comment="python-tk-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153296" comment="python-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606026" comment="python-xml-2.7.17-lp151.10.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151575" comment="python-xml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606885" comment="python3-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606886" comment="python3-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606887" comment="python3-base-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606888" comment="python3-base-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606889" comment="python3-curses-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606890" comment="python3-dbm-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606891" comment="python3-devel-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606892" comment="python3-doc-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606893" comment="python3-doc-devhelp-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606894" comment="python3-idle-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606895" comment="python3-testsuite-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606896" comment="python3-tk-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606897" comment="python3-tools-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26117</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00024.html" source="SUSE-SU"/>
    <description>
    In rfb/CSecurityTLS.cxx and rfb/CSecurityTLS.java in TigerVNC before 1.11.0, viewers mishandle TLS certificate exceptions. They store the certificates as authorities, meaning that the owner of a certificate could impersonate any server after a client had added an exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605983" comment="libXvnc-devel-1.9.0-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154213" comment="libXvnc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605984" comment="libXvnc1-1.9.0-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154118" comment="libXvnc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605985" comment="tigervnc-1.9.0-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605986" comment="tigervnc-x11vnc-1.9.0-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276534" comment="tigervnc-x11vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605987" comment="xorg-x11-Xvnc-1.9.0-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605988" comment="xorg-x11-Xvnc-java-1.9.0-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276535" comment="xorg-x11-Xvnc-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605989" comment="xorg-x11-Xvnc-module-1.9.0-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276536" comment="xorg-x11-Xvnc-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605990" comment="xorg-x11-Xvnc-novnc-1.9.0-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276537" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26137</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3Y5UAWOTOHQRGI2VNSOUDC2SOAHGJLAH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VS7J7DOJY26YMLJIUVHRH7UQFVLGBWIQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6CAFSANHH6TU43VSKAJ5JA2EMHSREMKP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOZI5ZFPFR2BACIE74HUJWDXC2ZWXNGD/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606772" comment="python2-urllib3-1.24-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009264573" comment="python2-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606773" comment="python2-urllib3-test-1.24-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266833" comment="python2-urllib3-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606774" comment="python3-urllib3-1.24-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606775" comment="python3-urllib3-test-1.24-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266834" comment="python3-urllib3-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26154" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1676-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html" source="SUSE-SU"/>
    <description>
    url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605545" comment="libproxy-devel-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151761" comment="libproxy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605546" comment="libproxy-sharp-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295954" comment="libproxy-sharp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605547" comment="libproxy-tools-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295955" comment="libproxy-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605548" comment="libproxy1-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151762" comment="libproxy1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605549" comment="libproxy1-32bit-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295956" comment="libproxy1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605550" comment="libproxy1-config-gnome3-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151763" comment="libproxy1-config-gnome3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605551" comment="libproxy1-config-kde-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154112" comment="libproxy1-config-kde is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605552" comment="libproxy1-networkmanager-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151765" comment="libproxy1-networkmanager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605553" comment="libproxy1-pacrunner-webkit-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151766" comment="libproxy1-pacrunner-webkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605554" comment="perl-Net-Libproxy-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295957" comment="perl-Net-Libproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605555" comment="python-libproxy-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295958" comment="python-libproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605556" comment="python3-libproxy-0.4.15-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295959" comment="python3-libproxy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26164" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26164" ref_url="https://www.suse.com/security/cve/CVE-2020-26164" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00018.html" source="SUSE-SU"/>
    <description>
    In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26164/">CVE-2020-26164</cve>
	<bugzilla href="https://bugzilla.suse.com/1176268">SUSE bug 1176268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177628">SUSE bug 1177628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609940" comment="kdeconnect-kde-1.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295059" comment="kdeconnect-kde is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609941" comment="kdeconnect-kde-lang-1.3.3-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295061" comment="kdeconnect-kde-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26215</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26215" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26215" ref_url="https://www.suse.com/security/cve/CVE-2020-26215" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T2R7EJ2EM5E7MLFSQTMZGFVV45CYMONR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0078-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PBYYAJDZEGK7HWUZML3NOYSMWWR5CVC3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OH7ZP2LBWERB26YSK5VYEQ2JEDDJXUOG/" source="SUSE-SU"/>
    <description>
    Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26215/">CVE-2020-26215</cve>
	<bugzilla href="https://bugzilla.suse.com/1180458">SUSE bug 1180458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609550" comment="python-jupyter_notebook-doc-5.7.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341932" comment="python-jupyter_notebook-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609551" comment="python2-jupyter_notebook-5.7.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341933" comment="python2-jupyter_notebook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609552" comment="python2-jupyter_notebook-lang-5.7.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341934" comment="python2-jupyter_notebook-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609553" comment="python2-jupyter_notebook-latex-5.7.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341935" comment="python2-jupyter_notebook-latex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609554" comment="python3-jupyter_notebook-5.7.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341936" comment="python3-jupyter_notebook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609555" comment="python3-jupyter_notebook-lang-5.7.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341937" comment="python3-jupyter_notebook-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609556" comment="python3-jupyter_notebook-latex-5.7.7-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341938" comment="python3-jupyter_notebook-latex is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2654</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604468" comment="java-11-openjdk-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604469" comment="java-11-openjdk-accessibility-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604470" comment="java-11-openjdk-demo-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604471" comment="java-11-openjdk-devel-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604472" comment="java-11-openjdk-headless-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604473" comment="java-11-openjdk-javadoc-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604474" comment="java-11-openjdk-jmods-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604475" comment="java-11-openjdk-src-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605277" comment="java-1_8_0-openjdk-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605278" comment="java-1_8_0-openjdk-accessibility-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605279" comment="java-1_8_0-openjdk-demo-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605280" comment="java-1_8_0-openjdk-devel-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605281" comment="java-1_8_0-openjdk-headless-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605282" comment="java-1_8_0-openjdk-javadoc-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605283" comment="java-1_8_0-openjdk-src-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2655</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2655" ref_url="https://www.suse.com/security/cve/CVE-2020-2655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2655/">CVE-2020-2655</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604468" comment="java-11-openjdk-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604469" comment="java-11-openjdk-accessibility-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604470" comment="java-11-openjdk-demo-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604471" comment="java-11-openjdk-devel-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604472" comment="java-11-openjdk-headless-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604473" comment="java-11-openjdk-javadoc-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604474" comment="java-11-openjdk-jmods-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604475" comment="java-11-openjdk-src-11.0.6.0-lp151.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26575</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26575" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26575" ref_url="https://www.suse.com/security/cve/CVE-2020-26575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007794.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5P4NEYKGIIBUWVHMTUJCIGGFEUIWBFC7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DRKIYJDZYHG7KXDJ3T5Y3UU4KEC2QGD/" source="SUSE-SU"/>
    <description>
    In Wireshark through 3.2.7, the Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop. This was addressed in epan/dissectors/packet-fbzero.c by correcting the implementation of offset advancement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26575/">CVE-2020-26575</cve>
	<bugzilla href="https://bugzilla.suse.com/1177406">SUSE bug 1177406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178290">SUSE bug 1178290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606506" comment="libwireshark13-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606507" comment="libwiretap10-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606508" comment="libwsutil11-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606509" comment="wireshark-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606510" comment="wireshark-devel-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606511" comment="wireshark-ui-qt-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2659</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605277" comment="java-1_8_0-openjdk-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605278" comment="java-1_8_0-openjdk-accessibility-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605279" comment="java-1_8_0-openjdk-demo-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605280" comment="java-1_8_0-openjdk-devel-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605281" comment="java-1_8_0-openjdk-headless-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605282" comment="java-1_8_0-openjdk-javadoc-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605283" comment="java-1_8_0-openjdk-src-1.8.0.242-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26664</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26664" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26664" ref_url="https://www.suse.com/security/cve/CVE-2020-26664" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD6C4CTIQTZF237437FPGD5AIRV33TET/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KIZQCEFFNAB3CPF433JKRUT3ZM2EDM33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0121-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IYGQU4F6PPW4XHK4LTESKSQ2CPHZS3QW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0122-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJCT5WYFJXXNRF5NSC7LOIHN7BD5UKVV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0691-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6NFAANEHTTDAXZIGCXPSKGYDFZDQ3HMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHKDVKJAYUS66PEMKU2REXIBZDZ6GFW/" source="SUSE-SU"/>
    <description>
    A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media player 3.0.11 allows attackers to trigger a heap-based buffer overflow via a crafted .mkv file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26664/">CVE-2020-26664</cve>
	<bugzilla href="https://bugzilla.suse.com/1180755">SUSE bug 1180755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609539" comment="libvlc5-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153021" comment="libvlc5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609540" comment="libvlccore9-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261716" comment="libvlccore9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609541" comment="vlc-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153023" comment="vlc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609542" comment="vlc-codec-gstreamer-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164833" comment="vlc-codec-gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609543" comment="vlc-devel-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153024" comment="vlc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609544" comment="vlc-jack-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261717" comment="vlc-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609545" comment="vlc-lang-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164834" comment="vlc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609546" comment="vlc-noX-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153026" comment="vlc-noX is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609547" comment="vlc-opencv-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281885" comment="vlc-opencv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609548" comment="vlc-qt-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153028" comment="vlc-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609549" comment="vlc-vdpau-3.0.11.1-lp151.6.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009261718" comment="vlc-vdpau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26934</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26934" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26934" ref_url="https://www.suse.com/security/cve/CVE-2020-26934" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" source="SUSE-SU"/>
    <description>
    phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26934/">CVE-2020-26934</cve>
	<bugzilla href="https://bugzilla.suse.com/1177561">SUSE bug 1177561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609827" comment="phpMyAdmin-4.9.7-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26935" ref_url="https://www.suse.com/security/cve/CVE-2020-26935" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-26935/">CVE-2020-26935</cve>
	<bugzilla href="https://bugzilla.suse.com/1177562">SUSE bug 1177562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609827" comment="phpMyAdmin-4.9.7-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26950</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AMXWTXD2SXOW4LKFZ4XU2QOQYXVDMOL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6SUAYN7JWUE2A26Q6GJ5JMMXTKYHZSL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMGXD75QZYXYUNEY2A43RG5HRUA6C7BT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3SMMQGPABLYJBCFGYFKI43SSCXS244L/" source="SUSE-SU"/>
    <description>
    In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox &lt; 82.0.3, Firefox ESR &lt; 78.4.1, and Thunderbird &lt; 78.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178611">SUSE bug 1178611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606133" comment="MozillaFirefox-78.4.1-lp151.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606134" comment="MozillaFirefox-branding-upstream-78.4.1-lp151.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606135" comment="MozillaFirefox-buildsymbols-78.4.1-lp151.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606136" comment="MozillaFirefox-devel-78.4.1-lp151.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606137" comment="MozillaFirefox-translations-common-78.4.1-lp151.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606138" comment="MozillaFirefox-translations-other-78.4.1-lp151.2.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606619" comment="MozillaThunderbird-78.4.2-lp151.2.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606620" comment="MozillaThunderbird-translations-common-78.4.2-lp151.2.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606621" comment="MozillaThunderbird-translations-other-78.4.2-lp151.2.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26951</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26953</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26956</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26958</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26959</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26960</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26961</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26965</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26966</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26968</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606259" comment="MozillaFirefox-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606260" comment="MozillaFirefox-branding-upstream-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606261" comment="MozillaFirefox-buildsymbols-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606262" comment="MozillaFirefox-devel-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606263" comment="MozillaFirefox-translations-common-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606264" comment="MozillaFirefox-translations-other-78.5.0-lp151.2.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606655" comment="MozillaThunderbird-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606656" comment="MozillaThunderbird-translations-common-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606657" comment="MozillaThunderbird-translations-other-78.5.0-lp151.2.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26971</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606877" comment="MozillaFirefox-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606878" comment="MozillaFirefox-branding-upstream-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606879" comment="MozillaFirefox-buildsymbols-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606880" comment="MozillaFirefox-devel-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606881" comment="MozillaFirefox-translations-common-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606882" comment="MozillaFirefox-translations-other-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606874" comment="MozillaThunderbird-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606875" comment="MozillaThunderbird-translations-common-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606876" comment="MozillaThunderbird-translations-other-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26973</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606877" comment="MozillaFirefox-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606878" comment="MozillaFirefox-branding-upstream-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606879" comment="MozillaFirefox-buildsymbols-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606880" comment="MozillaFirefox-devel-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606881" comment="MozillaFirefox-translations-common-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606882" comment="MozillaFirefox-translations-other-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606874" comment="MozillaThunderbird-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606875" comment="MozillaThunderbird-translations-common-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606876" comment="MozillaThunderbird-translations-other-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606877" comment="MozillaFirefox-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606878" comment="MozillaFirefox-branding-upstream-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606879" comment="MozillaFirefox-buildsymbols-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606880" comment="MozillaFirefox-devel-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606881" comment="MozillaFirefox-translations-common-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606882" comment="MozillaFirefox-translations-other-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606874" comment="MozillaThunderbird-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606875" comment="MozillaThunderbird-translations-common-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606876" comment="MozillaThunderbird-translations-other-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26976</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. This vulnerability affects Firefox &lt; 84.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609478" comment="MozillaFirefox-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609479" comment="MozillaFirefox-branding-upstream-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609480" comment="MozillaFirefox-buildsymbols-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609481" comment="MozillaFirefox-devel-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609482" comment="MozillaFirefox-translations-common-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609483" comment="MozillaFirefox-translations-other-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609475" comment="MozillaThunderbird-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609476" comment="MozillaThunderbird-translations-common-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609477" comment="MozillaThunderbird-translations-other-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26978</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606877" comment="MozillaFirefox-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606878" comment="MozillaFirefox-branding-upstream-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606879" comment="MozillaFirefox-buildsymbols-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606880" comment="MozillaFirefox-devel-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606881" comment="MozillaFirefox-translations-common-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606882" comment="MozillaFirefox-translations-other-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606874" comment="MozillaThunderbird-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606875" comment="MozillaThunderbird-translations-common-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606876" comment="MozillaThunderbird-translations-other-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27068" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-119770583
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27153</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27153" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27153" ref_url="https://www.suse.com/security/cve/CVE-2020-27153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00036.html" source="SUSE-SU"/>
    <description>
    In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-27153/">CVE-2020-27153</cve>
	<bugzilla href="https://bugzilla.suse.com/1177895">SUSE bug 1177895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606090" comment="bluez-5.48-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165944" comment="bluez is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606091" comment="bluez-auto-enable-devices-5.48-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242424" comment="bluez-auto-enable-devices is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606092" comment="bluez-cups-5.48-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165946" comment="bluez-cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606093" comment="bluez-devel-5.48-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165948" comment="bluez-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606094" comment="bluez-devel-32bit-5.48-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165950" comment="bluez-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606095" comment="bluez-test-5.48-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165952" comment="bluez-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606096" comment="libbluetooth3-5.48-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606097" comment="libbluetooth3-32bit-5.48-lp151.8.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165956" comment="libbluetooth3-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2732</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27347</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27347" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27347" ref_url="https://www.suse.com/security/cve/CVE-2020-27347" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00020.html" source="SUSE-SU"/>
    <description>
    In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-27347/">CVE-2020-27347</cve>
	<bugzilla href="https://bugzilla.suse.com/1178263">SUSE bug 1178263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178316">SUSE bug 1178316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609683" comment="tmux-3.1c-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009298611" comment="tmux is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2741</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2741" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2741" ref_url="https://www.suse.com/security/cve/CVE-2020-2741" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2741/">CVE-2020-2741</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174159">SUSE bug 1174159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2742</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2742" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2742" ref_url="https://www.suse.com/security/cve/CVE-2020-2742" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2742/">CVE-2020-2742</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2743</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2743" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2743" ref_url="https://www.suse.com/security/cve/CVE-2020-2743" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2743/">CVE-2020-2743</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2748</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2748" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2748" ref_url="https://www.suse.com/security/cve/CVE-2020-2748" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 3.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2748/">CVE-2020-2748</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609060" comment="libmysqld-devel-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609061" comment="libmysqld19-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609062" comment="mariadb-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609063" comment="mariadb-bench-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609064" comment="mariadb-client-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609065" comment="mariadb-errormessages-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609066" comment="mariadb-galera-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609067" comment="mariadb-test-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609068" comment="mariadb-tools-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2754</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2755</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2756</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27560</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27560" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1927-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AGPRC7JUH4MGYAWLWPLVA5TLIICGY75B/" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.10-34 allows Division by Zero in OptimizeLayerFrames in MagickCore/layer.c, which may cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560</cve>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606156" comment="ImageMagick-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606157" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606158" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606159" comment="ImageMagick-devel-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606160" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606161" comment="ImageMagick-doc-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606162" comment="ImageMagick-extra-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606163" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606164" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606165" comment="libMagick++-devel-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606166" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606167" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606168" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606169" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606170" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606171" comment="perl-PerlMagick-7.0.7.34-lp151.7.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2757</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2758</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2758" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2758" ref_url="https://www.suse.com/security/cve/CVE-2020-2758" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2758/">CVE-2020-2758</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2760" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2760" ref_url="https://www.suse.com/security/cve/CVE-2020-2760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2760/">CVE-2020-2760</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609060" comment="libmysqld-devel-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609061" comment="libmysqld19-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609062" comment="mariadb-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609063" comment="mariadb-bench-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609064" comment="mariadb-client-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609065" comment="mariadb-errormessages-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609066" comment="mariadb-galera-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609067" comment="mariadb-test-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609068" comment="mariadb-tools-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27619</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619</cve>
	<bugzilla href="https://bugzilla.suse.com/1178009">SUSE bug 1178009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180254">SUSE bug 1180254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193386">SUSE bug 1193386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606883" comment="libpython3_6m1_0-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606884" comment="libpython3_6m1_0-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606885" comment="python3-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606886" comment="python3-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606887" comment="python3-base-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606888" comment="python3-base-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606889" comment="python3-curses-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606890" comment="python3-dbm-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606891" comment="python3-devel-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606892" comment="python3-doc-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606893" comment="python3-doc-devhelp-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606894" comment="python3-idle-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606895" comment="python3-testsuite-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606896" comment="python3-tk-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606897" comment="python3-tools-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2767" ref_url="https://www.suse.com/security/cve/CVE-2020-2767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2767/">CVE-2020-2767</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27670</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606694" comment="xen-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606695" comment="xen-devel-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606696" comment="xen-doc-html-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606697" comment="xen-libs-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606698" comment="xen-libs-32bit-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606699" comment="xen-tools-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606700" comment="xen-tools-domU-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27671</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606694" comment="xen-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606695" comment="xen-devel-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606696" comment="xen-doc-html-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606697" comment="xen-libs-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606698" comment="xen-libs-32bit-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606699" comment="xen-tools-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606700" comment="xen-tools-domU-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27672</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606694" comment="xen-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606695" comment="xen-devel-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606696" comment="xen-doc-html-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606697" comment="xen-libs-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606698" comment="xen-libs-32bit-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606699" comment="xen-tools-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606700" comment="xen-tools-domU-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27673</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606003" comment="xen-4.12.3_10-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606004" comment="xen-devel-4.12.3_10-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606005" comment="xen-doc-html-4.12.3_10-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606006" comment="xen-libs-4.12.3_10-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606007" comment="xen-libs-32bit-4.12.3_10-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606008" comment="xen-tools-4.12.3_10-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606009" comment="xen-tools-domU-4.12.3_10-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27674</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606694" comment="xen-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606695" comment="xen-devel-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606696" comment="xen-doc-html-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606697" comment="xen-libs-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606698" comment="xen-libs-32bit-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606699" comment="xen-tools-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606700" comment="xen-tools-domU-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2773</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27745</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27745" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27745" ref_url="https://www.suse.com/security/cve/CVE-2020-27745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2033-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YK5TOFTMMMLNW5U6MVRZ2CYJN3MTJQ3H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6EPEASTWK66PMT44C2GSQXHCPXCOLCZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2286-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNYAPPFTPC34OZ2Z2DMX2VNAUGZWQ5LN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J42YJUAKDUG5O7YONJOQ2TWDUORC5MXP/" source="SUSE-SU"/>
    <description>
    Slurm before 19.05.8 and 20.x before 20.02.6 has an RPC Buffer Overflow in the PMIx MPI plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27745/">CVE-2020-27745</cve>
	<bugzilla href="https://bugzilla.suse.com/1178890">SUSE bug 1178890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606776" comment="libpmi0-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606777" comment="libslurm33-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266850" comment="libslurm33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606778" comment="perl-slurm-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606779" comment="slurm-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606780" comment="slurm-auth-none-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606781" comment="slurm-config-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606782" comment="slurm-config-man-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606783" comment="slurm-cray-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606784" comment="slurm-devel-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606785" comment="slurm-doc-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606786" comment="slurm-hdf5-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606787" comment="slurm-lua-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606788" comment="slurm-munge-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606789" comment="slurm-node-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606790" comment="slurm-openlava-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606791" comment="slurm-pam_slurm-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606792" comment="slurm-plugins-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606793" comment="slurm-seff-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606794" comment="slurm-sjstat-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606795" comment="slurm-slurmdbd-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606796" comment="slurm-sql-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606797" comment="slurm-sview-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606798" comment="slurm-torque-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606799" comment="slurm-webdoc-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27746</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27746" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27746" ref_url="https://www.suse.com/security/cve/CVE-2020-27746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2033-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YK5TOFTMMMLNW5U6MVRZ2CYJN3MTJQ3H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6EPEASTWK66PMT44C2GSQXHCPXCOLCZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2286-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNYAPPFTPC34OZ2Z2DMX2VNAUGZWQ5LN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J42YJUAKDUG5O7YONJOQ2TWDUORC5MXP/" source="SUSE-SU"/>
    <description>
    Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27746/">CVE-2020-27746</cve>
	<bugzilla href="https://bugzilla.suse.com/1178891">SUSE bug 1178891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606776" comment="libpmi0-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230283" comment="libpmi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606777" comment="libslurm33-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266850" comment="libslurm33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606778" comment="perl-slurm-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230285" comment="perl-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606779" comment="slurm-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230286" comment="slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606780" comment="slurm-auth-none-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230287" comment="slurm-auth-none is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606781" comment="slurm-config-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230288" comment="slurm-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606782" comment="slurm-config-man-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266851" comment="slurm-config-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606783" comment="slurm-cray-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266852" comment="slurm-cray is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606784" comment="slurm-devel-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230289" comment="slurm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606785" comment="slurm-doc-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230290" comment="slurm-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606786" comment="slurm-hdf5-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266853" comment="slurm-hdf5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606787" comment="slurm-lua-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230291" comment="slurm-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606788" comment="slurm-munge-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230292" comment="slurm-munge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606789" comment="slurm-node-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230293" comment="slurm-node is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606790" comment="slurm-openlava-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230294" comment="slurm-openlava is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606791" comment="slurm-pam_slurm-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230295" comment="slurm-pam_slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606792" comment="slurm-plugins-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230296" comment="slurm-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606793" comment="slurm-seff-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230297" comment="slurm-seff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606794" comment="slurm-sjstat-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230298" comment="slurm-sjstat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606795" comment="slurm-slurmdbd-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230299" comment="slurm-slurmdbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606796" comment="slurm-sql-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230300" comment="slurm-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606797" comment="slurm-sview-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230301" comment="slurm-sview is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606798" comment="slurm-torque-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230302" comment="slurm-torque is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606799" comment="slurm-webdoc-18.08.9-lp151.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276533" comment="slurm-webdoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27750</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27751</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27752</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27753</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27754</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27755</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27756</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27756" ref_url="https://www.suse.com/security/cve/CVE-2020-27756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27756/">CVE-2020-27756</cve>
	<bugzilla href="https://bugzilla.suse.com/1179221">SUSE bug 1179221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27757</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27758</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27758" ref_url="https://www.suse.com/security/cve/CVE-2020-27758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27758/">CVE-2020-27758</cve>
	<bugzilla href="https://bugzilla.suse.com/1179276">SUSE bug 1179276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27759</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27760</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27761</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27762</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27763</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27764</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27765</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27766</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27767</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27768</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27769</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27770</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27771</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27772</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27773</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27774</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27775</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27776</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27777</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2778</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2778" ref_url="https://www.suse.com/security/cve/CVE-2020-2778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2778/">CVE-2020-2778</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27781" ref_url="https://www.suse.com/security/cve/CVE-2020-27781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008148.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VIGY47XAX5FSNNMOBHOKUCFSJHIH4RII/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6DKXUZUWGIN6CZATVDSZF3XYMJUH7LE/" source="SUSE-SU"/>
    <description>
    User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-10"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-27781/">CVE-2020-27781</cve>
	<bugzilla href="https://bugzilla.suse.com/1179802">SUSE bug 1179802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180155">SUSE bug 1180155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609557" comment="ceph-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154227" comment="ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609558" comment="ceph-base-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154228" comment="ceph-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609559" comment="ceph-common-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154229" comment="ceph-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609560" comment="ceph-dashboard-e2e-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278214" comment="ceph-dashboard-e2e is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609561" comment="ceph-fuse-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154230" comment="ceph-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609562" comment="ceph-grafana-dashboards-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278215" comment="ceph-grafana-dashboards is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609563" comment="ceph-mds-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154231" comment="ceph-mds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609564" comment="ceph-mgr-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177893" comment="ceph-mgr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609565" comment="ceph-mgr-dashboard-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278216" comment="ceph-mgr-dashboard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609566" comment="ceph-mgr-diskprediction-cloud-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278217" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609567" comment="ceph-mgr-diskprediction-local-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278218" comment="ceph-mgr-diskprediction-local is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609568" comment="ceph-mgr-k8sevents-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278219" comment="ceph-mgr-k8sevents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609569" comment="ceph-mgr-rook-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278220" comment="ceph-mgr-rook is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609570" comment="ceph-mgr-ssh-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278221" comment="ceph-mgr-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609571" comment="ceph-mon-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154232" comment="ceph-mon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609572" comment="ceph-osd-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154233" comment="ceph-osd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609573" comment="ceph-prometheus-alerts-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278222" comment="ceph-prometheus-alerts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609574" comment="ceph-radosgw-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154234" comment="ceph-radosgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609575" comment="ceph-resource-agents-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154235" comment="ceph-resource-agents is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609576" comment="ceph-test-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154236" comment="ceph-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609577" comment="cephfs-shell-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278223" comment="cephfs-shell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609578" comment="libcephfs-devel-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154237" comment="libcephfs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609579" comment="libcephfs2-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177894" comment="libcephfs2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609580" comment="librados-devel-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154239" comment="librados-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609581" comment="librados2-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609582" comment="libradospp-devel-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278224" comment="libradospp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609583" comment="libradosstriper-devel-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154241" comment="libradosstriper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609584" comment="libradosstriper1-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154242" comment="libradosstriper1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609585" comment="librbd-devel-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154243" comment="librbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609586" comment="librbd1-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609587" comment="librgw-devel-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154245" comment="librgw-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609588" comment="librgw2-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154246" comment="librgw2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609589" comment="python3-ceph-argparse-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177896" comment="python3-ceph-argparse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609590" comment="python3-cephfs-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177897" comment="python3-cephfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609591" comment="python3-rados-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177898" comment="python3-rados is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609592" comment="python3-rbd-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177899" comment="python3-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609593" comment="python3-rgw-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177900" comment="python3-rgw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609594" comment="rados-objclass-devel-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177901" comment="rados-objclass-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609595" comment="rbd-fuse-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154251" comment="rbd-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609596" comment="rbd-mirror-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154252" comment="rbd-mirror is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609597" comment="rbd-nbd-14.2.16.402+g7d47dbaf4d-lp151.2.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154253" comment="rbd-nbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27786</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27786" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2781</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27818</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27818" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27818" ref_url="https://www.suse.com/security/cve/CVE-2020-27818" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6X67BQ55SUAPPGYOKAMOSKREWWBB3IML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPNGY4RQOIMXS6TTD3ACRQAMK2RAWPXG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2220-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NV3VWVURXABVRUNQHZKR6NMGC57TGOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2227-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2B2QIGVX2RVTJFGI36POZTZGDGLBTYHX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the check_chunk_name() function of pngcheck-2.4.0. An attacker able to pass a malicious file to be processed by pngcheck could cause a temporary denial of service, posing a low risk to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-27818/">CVE-2020-27818</cve>
	<bugzilla href="https://bugzilla.suse.com/1179528">SUSE bug 1179528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606723" comment="pngcheck-2.3.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338019" comment="pngcheck is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27825</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2800</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28030</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28030" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28030" ref_url="https://www.suse.com/security/cve/CVE-2020-28030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007794.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5P4NEYKGIIBUWVHMTUJCIGGFEUIWBFC7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DRKIYJDZYHG7KXDJ3T5Y3UU4KEC2QGD/" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.7, the GQUIC dissector could crash. This was addressed in epan/dissectors/packet-gquic.c by correcting the implementation of offset advancement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28030/">CVE-2020-28030</cve>
	<bugzilla href="https://bugzilla.suse.com/1178291">SUSE bug 1178291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606506" comment="libwireshark13-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606507" comment="libwiretap10-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606508" comment="libwsutil11-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606509" comment="wireshark-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606510" comment="wireshark-devel-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606511" comment="wireshark-ui-qt-3.2.8-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28049</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28049" ref_url="https://www.suse.com/security/cve/CVE-2020-28049" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TO7JRTPGBU4JZ3MOLPKGZUUXQGICWL4Z/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SDDM before 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display contents and, for example, intercept keystrokes or access the clipboard. This is caused by a race condition during Xauthority file creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-28049/">CVE-2020-28049</cve>
	<bugzilla href="https://bugzilla.suse.com/1177201">SUSE bug 1177201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609942" comment="sddm-0.18.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152215" comment="sddm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609943" comment="sddm-branding-openSUSE-0.18.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152216" comment="sddm-branding-openSUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609944" comment="sddm-branding-upstream-0.18.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231933" comment="sddm-branding-upstream is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2805</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2812" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609060" comment="libmysqld-devel-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609061" comment="libmysqld19-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609062" comment="mariadb-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609063" comment="mariadb-bench-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609064" comment="mariadb-client-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609065" comment="mariadb-errormessages-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609066" comment="mariadb-galera-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609067" comment="mariadb-test-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609068" comment="mariadb-tools-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2814</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2814" ref_url="https://www.suse.com/security/cve/CVE-2020-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.6.47 and prior, 5.7.28 and prior and 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2814/">CVE-2020-2814</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609060" comment="libmysqld-devel-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152840" comment="libmysqld-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609061" comment="libmysqld19-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177123" comment="libmysqld19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609062" comment="mariadb-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609063" comment="mariadb-bench-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609064" comment="mariadb-client-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609065" comment="mariadb-errormessages-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609066" comment="mariadb-galera-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609067" comment="mariadb-test-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609068" comment="mariadb-tools-10.2.32-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2816</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2816" ref_url="https://www.suse.com/security/cve/CVE-2020-2816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-2816/">CVE-2020-2816</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28196</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2CMUQ7G43OCIKDTP2ILYUJLUD37RPPA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6PZTATZYCUQYKCJ6QBS7JJHNWPXIDNL/" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606315" comment="krb5-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606316" comment="krb5-32bit-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151006" comment="krb5-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606317" comment="krb5-client-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151007" comment="krb5-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606318" comment="krb5-devel-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151008" comment="krb5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606319" comment="krb5-devel-32bit-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152677" comment="krb5-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606320" comment="krb5-mini-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152679" comment="krb5-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606321" comment="krb5-mini-devel-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152680" comment="krb5-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606322" comment="krb5-plugin-kdb-ldap-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152681" comment="krb5-plugin-kdb-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606323" comment="krb5-plugin-preauth-otp-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152682" comment="krb5-plugin-preauth-otp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606324" comment="krb5-plugin-preauth-pkinit-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152683" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606325" comment="krb5-server-1.16.3-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152684" comment="krb5-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2830</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608247" comment="java-11-openjdk-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231592" comment="java-11-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608248" comment="java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231593" comment="java-11-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608249" comment="java-11-openjdk-demo-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231594" comment="java-11-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608250" comment="java-11-openjdk-devel-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231595" comment="java-11-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608251" comment="java-11-openjdk-headless-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231596" comment="java-11-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608252" comment="java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231597" comment="java-11-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608253" comment="java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231598" comment="java-11-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608254" comment="java-11-openjdk-src-11.0.7.0-lp151.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231599" comment="java-11-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608541" comment="java-1_8_0-openjdk-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152674" comment="java-1_8_0-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608542" comment="java-1_8_0-openjdk-accessibility-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152835" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608543" comment="java-1_8_0-openjdk-demo-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152836" comment="java-1_8_0-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608544" comment="java-1_8_0-openjdk-devel-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152675" comment="java-1_8_0-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608545" comment="java-1_8_0-openjdk-headless-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152676" comment="java-1_8_0-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608546" comment="java-1_8_0-openjdk-javadoc-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152837" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608547" comment="java-1_8_0-openjdk-src-1.8.0.252-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152838" comment="java-1_8_0-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28362</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28362" ref_url="https://www.suse.com/security/cve/CVE-2020-28362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2QCSRQATMLK7WM4IWLILC7IQJFW7PVI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQVUQXAVUQCNNOSHNTQGRCAEYALRL2NA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGUG34M7TVN5CJXWIHJF454FAT7TTWY/" source="SUSE-SU"/>
    <description>
    Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28362/">CVE-2020-28362</cve>
	<bugzilla href="https://bugzilla.suse.com/1178750">SUSE bug 1178750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606336" comment="go1.14-1.14.12-lp151.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606337" comment="go1.14-doc-1.14.12-lp151.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606338" comment="go1.14-race-1.14.12-lp151.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28366</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28366" ref_url="https://www.suse.com/security/cve/CVE-2020-28366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2QCSRQATMLK7WM4IWLILC7IQJFW7PVI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQVUQXAVUQCNNOSHNTQGRCAEYALRL2NA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGUG34M7TVN5CJXWIHJF454FAT7TTWY/" source="SUSE-SU"/>
    <description>
    Go before 1.14.12 and 1.15.x before 1.15.5 allows Code Injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28366/">CVE-2020-28366</cve>
	<bugzilla href="https://bugzilla.suse.com/1178753">SUSE bug 1178753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606336" comment="go1.14-1.14.12-lp151.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606337" comment="go1.14-doc-1.14.12-lp151.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606338" comment="go1.14-race-1.14.12-lp151.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28367</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28367" ref_url="https://www.suse.com/security/cve/CVE-2020-28367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2QCSRQATMLK7WM4IWLILC7IQJFW7PVI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQVUQXAVUQCNNOSHNTQGRCAEYALRL2NA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGUG34M7TVN5CJXWIHJF454FAT7TTWY/" source="SUSE-SU"/>
    <description>
    Go before 1.14.12 and 1.15.x before 1.15.5 allows Argument Injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28367/">CVE-2020-28367</cve>
	<bugzilla href="https://bugzilla.suse.com/1178752">SUSE bug 1178752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606336" comment="go1.14-1.14.12-lp151.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606337" comment="go1.14-doc-1.14.12-lp151.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606338" comment="go1.14-race-1.14.12-lp151.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28368</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NHV4EWRFFS4A6PZIGBZQ2KTQFUWF52LY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4ZVHN5CZEV5SEFNJFHEB2GTN3V6YCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-30"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606694" comment="xen-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606695" comment="xen-devel-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606696" comment="xen-doc-html-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606697" comment="xen-libs-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606698" comment="xen-libs-32bit-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606699" comment="xen-tools-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606700" comment="xen-tools-domU-4.12.4_04-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28374</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28896</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28896" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEIF6HZ3PYQV7UDRJUX7FTYYPTVCBVB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RYE5B2QAZHGR4OUGARLIROGTKWRSGYPL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606521" comment="mutt-1.10.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606522" comment="mutt-doc-1.10.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606523" comment="mutt-lang-1.10.1-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609858" comment="neomutt-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302848" comment="neomutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609859" comment="neomutt-doc-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302850" comment="neomutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609860" comment="neomutt-lang-20201120-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009302852" comment="neomutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28915</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28915" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606291" comment="kernel-debug-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606292" comment="kernel-debug-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606293" comment="kernel-debug-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606294" comment="kernel-default-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606295" comment="kernel-default-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606296" comment="kernel-default-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606297" comment="kernel-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606298" comment="kernel-docs-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606299" comment="kernel-docs-html-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606300" comment="kernel-kvmsmall-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606301" comment="kernel-kvmsmall-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606302" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606303" comment="kernel-macros-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606304" comment="kernel-obs-build-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606305" comment="kernel-obs-qa-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606306" comment="kernel-source-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606307" comment="kernel-source-vanilla-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606308" comment="kernel-syms-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606309" comment="kernel-vanilla-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606310" comment="kernel-vanilla-base-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606311" comment="kernel-vanilla-devel-4.12.14-lp151.28.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28924</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28924" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28924" ref_url="https://www.suse.com/security/cve/CVE-2020-28924" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7U7GCOTNOZAWDNUDHOMKJOI2QXP3XJCD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2035-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K5BB2LYUVWQ74YU27Y4CMHJW42OBMUOT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C25WPUFSVQJ345UHYEYH27MOG434LTTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBEJTWZN65MCKRTHPA4DPTTL2ZUEQGTM/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-28924/">CVE-2020-28924</cve>
	<bugzilla href="https://bugzilla.suse.com/1179005">SUSE bug 1179005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606312" comment="rclone-1.53.3-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300204" comment="rclone is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606313" comment="rclone-bash-completion-1.53.3-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300205" comment="rclone-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606314" comment="rclone-zsh-completion-1.53.3-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300206" comment="rclone-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28926</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28926" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28926" ref_url="https://www.suse.com/security/cve/CVE-2020-28926" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2GHF3UJM6D2JSKELXMJY57IRWK3PJM3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSSIKL5YFHBGYOJ3SQBDZNPPVD4OU4WF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNZKSW2K4W6JRPVMJ5SOHHDWS6UI5LAZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7S45AUDAZDSITTGVELYZ3FY6T7HMLOED/" source="SUSE-SU"/>
    <description>
    ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Sending a malicious UPnP HTTP request to the miniDLNA service using HTTP chunked encoding can lead to a signedness bug resulting in a buffer overflow in calls to memcpy/memmove.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-28926/">CVE-2020-28926</cve>
	<bugzilla href="https://bugzilla.suse.com/1179447">SUSE bug 1179447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606722" comment="minidlna-1.3.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009334739" comment="minidlna is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28935</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0176-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021588.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FIDKYB6WSN55OA36HXF3BL4UYWBXAEV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTS3PI42CZC7TVKVUTBOIMO2PDFTABYC/" source="SUSE-SU"/>
    <description>
    NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Unbound/NSD is running on. It requires an attacker having access to the limited permission user Unbound/NSD runs as and point through the symlink to a critical file on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935</cve>
	<bugzilla href="https://bugzilla.suse.com/1173619">SUSE bug 1173619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179191">SUSE bug 1179191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609757" comment="nsd-4.1.27-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338518" comment="nsd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2894</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2894" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2894" ref_url="https://www.suse.com/security/cve/CVE-2020-2894" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2894/">CVE-2020-2894</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28974</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606701" comment="kernel-debug-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606702" comment="kernel-debug-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606703" comment="kernel-debug-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606704" comment="kernel-default-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606705" comment="kernel-default-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606706" comment="kernel-default-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606707" comment="kernel-devel-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606708" comment="kernel-docs-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606709" comment="kernel-docs-html-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606710" comment="kernel-kvmsmall-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606711" comment="kernel-kvmsmall-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606712" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606713" comment="kernel-macros-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606714" comment="kernel-obs-build-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606715" comment="kernel-obs-qa-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606716" comment="kernel-source-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606717" comment="kernel-source-vanilla-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606718" comment="kernel-syms-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606719" comment="kernel-vanilla-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606720" comment="kernel-vanilla-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606721" comment="kernel-vanilla-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2902</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2902" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2902" ref_url="https://www.suse.com/security/cve/CVE-2020-2902" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2902/">CVE-2020-2902</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2905</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2905" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2905" ref_url="https://www.suse.com/security/cve/CVE-2020-2905" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2905/">CVE-2020-2905</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2907</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2907" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2907" ref_url="https://www.suse.com/security/cve/CVE-2020-2907" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2907/">CVE-2020-2907</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2908</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2908" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2908" ref_url="https://www.suse.com/security/cve/CVE-2020-2908" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2908/">CVE-2020-2908</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2909</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2909" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2909" ref_url="https://www.suse.com/security/cve/CVE-2020-2909" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 2.8 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2909/">CVE-2020-2909</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2910</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2910" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2910" ref_url="https://www.suse.com/security/cve/CVE-2020-2910" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2910/">CVE-2020-2910</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2911</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2911" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2911" ref_url="https://www.suse.com/security/cve/CVE-2020-2911" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2911/">CVE-2020-2911</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2913</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2913" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2913" ref_url="https://www.suse.com/security/cve/CVE-2020-2913" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2913/">CVE-2020-2913</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2914</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2914" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2914" ref_url="https://www.suse.com/security/cve/CVE-2020-2914" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2914/">CVE-2020-2914</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2929</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2929" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2929" ref_url="https://www.suse.com/security/cve/CVE-2020-2929" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2929/">CVE-2020-2929</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29367</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29367" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29367" ref_url="https://www.suse.com/security/cve/CVE-2020-29367" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:2337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPTII3AXCRZZGBCOLCFY7HQI24L2PGVQ/" source="SUSE-SU"/>
    <description>
    blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-29367/">CVE-2020-29367</cve>
	<bugzilla href="https://bugzilla.suse.com/1179914">SUSE bug 1179914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609945" comment="blosc-devel-1.20.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340461" comment="blosc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609946" comment="libblosc1-1.20.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340463" comment="libblosc1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29371</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29371" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606701" comment="kernel-debug-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606702" comment="kernel-debug-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606703" comment="kernel-debug-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606704" comment="kernel-default-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606705" comment="kernel-default-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606706" comment="kernel-default-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606707" comment="kernel-devel-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606708" comment="kernel-docs-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606709" comment="kernel-docs-html-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606710" comment="kernel-kvmsmall-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606711" comment="kernel-kvmsmall-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606712" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606713" comment="kernel-macros-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606714" comment="kernel-obs-build-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606715" comment="kernel-obs-qa-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606716" comment="kernel-source-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606717" comment="kernel-source-vanilla-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606718" comment="kernel-syms-4.12.14-lp151.28.87.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606719" comment="kernel-vanilla-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606720" comment="kernel-vanilla-base-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606721" comment="kernel-vanilla-devel-4.12.14-lp151.28.87.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29480</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests' devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606867" comment="xen-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606868" comment="xen-devel-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606869" comment="xen-doc-html-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606870" comment="xen-libs-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606871" comment="xen-libs-32bit-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606872" comment="xen-tools-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606873" comment="xen-tools-domU-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29481</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/&lt;domid&gt; are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606867" comment="xen-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606868" comment="xen-devel-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606869" comment="xen-doc-html-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606870" comment="xen-libs-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606871" comment="xen-libs-32bit-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606872" comment="xen-tools-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606873" comment="xen-tools-domU-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29483</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored's internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest's memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606867" comment="xen-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606868" comment="xen-devel-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606869" comment="xen-doc-html-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606870" comment="xen-libs-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606871" comment="xen-libs-32bit-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606872" comment="xen-tools-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606873" comment="xen-tools-domU-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29484</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606867" comment="xen-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606868" comment="xen-devel-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606869" comment="xen-doc-html-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606870" comment="xen-libs-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606871" comment="xen-libs-32bit-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606872" comment="xen-tools-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606873" comment="xen-tools-domU-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2951</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2951" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2951" ref_url="https://www.suse.com/security/cve/CVE-2020-2951" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2951/">CVE-2020-2951</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29566</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606867" comment="xen-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606868" comment="xen-devel-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606869" comment="xen-doc-html-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606870" comment="xen-libs-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606871" comment="xen-libs-32bit-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606872" comment="xen-tools-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606873" comment="xen-tools-domU-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29568</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29569</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-&gt;xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29570</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606867" comment="xen-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606868" comment="xen-devel-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606869" comment="xen-doc-html-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606870" comment="xen-libs-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606871" comment="xen-libs-32bit-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606872" comment="xen-tools-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606873" comment="xen-tools-domU-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29571</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606867" comment="xen-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151587" comment="xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606868" comment="xen-devel-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151929" comment="xen-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606869" comment="xen-doc-html-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151588" comment="xen-doc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606870" comment="xen-libs-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606871" comment="xen-libs-32bit-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151930" comment="xen-libs-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606872" comment="xen-tools-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151591" comment="xen-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606873" comment="xen-tools-domU-4.12.4_06-lp151.2.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151592" comment="xen-tools-domU is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2958</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2958" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2958" ref_url="https://www.suse.com/security/cve/CVE-2020-2958" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2958/">CVE-2020-2958</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2959</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2959" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2959" ref_url="https://www.suse.com/security/cve/CVE-2020-2959" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via MLD to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2959/">CVE-2020-2959</cve>
	<bugzilla href="https://bugzilla.suse.com/1169628">SUSE bug 1169628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609145" comment="python3-virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231803" comment="python3-virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609146" comment="virtualbox-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152062" comment="virtualbox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609147" comment="virtualbox-devel-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153267" comment="virtualbox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609148" comment="virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153268" comment="virtualbox-guest-desktop-icons is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609149" comment="virtualbox-guest-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166864" comment="virtualbox-guest-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609150" comment="virtualbox-guest-tools-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152064" comment="virtualbox-guest-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609151" comment="virtualbox-guest-x11-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152065" comment="virtualbox-guest-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609152" comment="virtualbox-host-source-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153269" comment="virtualbox-host-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609153" comment="virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286913" comment="virtualbox-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609154" comment="virtualbox-qt-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152067" comment="virtualbox-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609155" comment="virtualbox-vnc-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166871" comment="virtualbox-vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609156" comment="virtualbox-websrv-6.0.22-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153270" comment="virtualbox-websrv is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29599</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29599" ref_url="https://www.suse.com/security/cve/CVE-2020-29599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29599/">CVE-2020-29599</cve>
	<bugzilla href="https://bugzilla.suse.com/1179753">SUSE bug 1179753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609440" comment="ImageMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609441" comment="ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609442" comment="ImageMagick-config-7-upstream-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252942" comment="ImageMagick-config-7-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609443" comment="ImageMagick-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609444" comment="ImageMagick-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152592" comment="ImageMagick-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609445" comment="ImageMagick-doc-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609446" comment="ImageMagick-extra-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609447" comment="libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177175" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609448" comment="libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231080" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609449" comment="libMagick++-devel-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609450" comment="libMagick++-devel-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152597" comment="libMagick++-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609451" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177176" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609452" comment="libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231081" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609453" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177177" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609454" comment="libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231082" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609455" comment="perl-PerlMagick-7.0.7.34-lp151.7.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29660</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29661</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3123</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3123" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<bugzilla href="https://bugzilla.suse.com/1162921">SUSE bug 1162921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3327</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<bugzilla href="https://bugzilla.suse.com/1171980">SUSE bug 1171980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3341</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3350</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3350" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3481</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3481" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606756" comment="clamav-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151381" comment="clamav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606757" comment="clamav-devel-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231589" comment="clamav-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606758" comment="libclamav9-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339621" comment="libclamav9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606759" comment="libfreshclam2-0.103.0-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009339622" comment="libfreshclam2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35111</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    When an extension with the proxy permission registered to receive &lt;all_urls&gt;, the proxy.onRequest callback was not triggered for view-source URLs. While web content cannot navigate to such URLs, a user opening View Source could have inadvertently leaked their IP address. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606877" comment="MozillaFirefox-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606878" comment="MozillaFirefox-branding-upstream-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606879" comment="MozillaFirefox-buildsymbols-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606880" comment="MozillaFirefox-devel-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606881" comment="MozillaFirefox-translations-common-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606882" comment="MozillaFirefox-translations-other-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606874" comment="MozillaThunderbird-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606875" comment="MozillaThunderbird-translations-common-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606876" comment="MozillaThunderbird-translations-other-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35112</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35112" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606877" comment="MozillaFirefox-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606878" comment="MozillaFirefox-branding-upstream-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606879" comment="MozillaFirefox-buildsymbols-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606880" comment="MozillaFirefox-devel-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606881" comment="MozillaFirefox-translations-common-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606882" comment="MozillaFirefox-translations-other-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606874" comment="MozillaThunderbird-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606875" comment="MozillaThunderbird-translations-common-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606876" comment="MozillaThunderbird-translations-other-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35113</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606877" comment="MozillaFirefox-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606878" comment="MozillaFirefox-branding-upstream-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606879" comment="MozillaFirefox-buildsymbols-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606880" comment="MozillaFirefox-devel-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606881" comment="MozillaFirefox-translations-common-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606882" comment="MozillaFirefox-translations-other-78.6.0-lp151.2.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606874" comment="MozillaThunderbird-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606875" comment="MozillaThunderbird-translations-common-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606876" comment="MozillaThunderbird-translations-other-78.6.0-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35458</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35458" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35458" ref_url="https://www.suse.com/security/cve/CVE-2020-35458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0054-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VO5ZHH4IHE4JSXKLL5QNLXOG2AGDRLET/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SOXP4NYYMFT7XRFF2RMNSWISI2EL5AIV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNP2UKCT3X4BSG36I6GNTIIY4ETH3NYP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO3NRDHGVEML362SDTPCVE3FO4TKG3ZX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35458/">CVE-2020-35458</cve>
	<bugzilla href="https://bugzilla.suse.com/1179998">SUSE bug 1179998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609439" comment="hawk2-2.4.0+git.1611141202.2fe6369e-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341551" comment="hawk2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35459</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35459" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35459" ref_url="https://www.suse.com/security/cve/CVE-2020-35459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009458.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RKSUG2OZN3Y2FQVQ55HP5MZIQZXZ5OD6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKSDDKFQ4YKEAUB3EUAWBPTKNEOH254X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0410-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNDVFBI7G272LNZ2QQZ4MY56KX2J4C36/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0473-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P6Y6RW5YXKZSLM7CRGCZD5EXRQATEN6Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1087-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDCDHUWYXHAR4IFS55R2KWBURUA5HAL7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZ4AG2NNHICHYHJBLJR3CWGTGZLQBUDP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35459/">CVE-2020-35459</cve>
	<bugzilla href="https://bugzilla.suse.com/1179999">SUSE bug 1179999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609514" comment="crmsh-4.2.0+git.1607075079.a25648d8-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341552" comment="crmsh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609515" comment="crmsh-scripts-4.2.0+git.1607075079.a25648d8-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341553" comment="crmsh-scripts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609516" comment="crmsh-test-4.2.0+git.1607075079.a25648d8-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341554" comment="crmsh-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35678</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35678" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35678" ref_url="https://www.suse.com/security/cve/CVE-2020-35678" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0132-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HC22UZIJVKS65SOAIGLLU6XWHC73XYOM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXPO3Q3UW27SSZ5A6MCOSCPUHQM7HB7N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6HWC7EEESMXCVV3M3M6OYUZFEGILI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YFFLEQLA5JEDUCNZ6SDNWX77OSIWNZNB/" source="SUSE-SU"/>
    <description>
    Autobahn|Python before 20.12.3 allows redirect header injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-35678/">CVE-2020-35678</cve>
	<bugzilla href="https://bugzilla.suse.com/1180570">SUSE bug 1180570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609436" comment="python2-autobahn-17.10.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342290" comment="python2-autobahn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609437" comment="python3-autobahn-17.10.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342291" comment="python3-autobahn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35738</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35738" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008521.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    WavPack 5.3.0 has an out-of-bounds write in WavpackPackSamples in pack_utils.c because of an integer overflow in a malloc argument. NOTE: some third-parties claim that there are later "unofficial" releases through 5.3.2, which are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609456" comment="libwavpack1-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172747" comment="libwavpack1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609457" comment="libwavpack1-32bit-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172748" comment="libwavpack1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609458" comment="wavpack-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172749" comment="wavpack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609459" comment="wavpack-devel-5.4.0-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172750" comment="wavpack-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36158</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. A malicious website may be able to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606980" comment="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606981" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606982" comment="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606983" comment="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606984" comment="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606985" comment="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606986" comment="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606987" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606988" comment="webkit-jsc-4-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606989" comment="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606990" comment="webkit2gtk3-devel-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606991" comment="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3864</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3864" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17, iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS 13.3.1. A DOM object context may not have had a unique security origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606980" comment="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606981" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606982" comment="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606983" comment="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606984" comment="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606985" comment="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606986" comment="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606987" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606988" comment="webkit-jsc-4-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606989" comment="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606990" comment="webkit2gtk3-devel-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606991" comment="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3865</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3865" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606980" comment="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606981" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606982" comment="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606983" comment="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606984" comment="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606985" comment="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606986" comment="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606987" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606988" comment="webkit-jsc-4-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606989" comment="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606990" comment="webkit2gtk3-devel-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606991" comment="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3867</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606980" comment="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606981" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606982" comment="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606983" comment="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606984" comment="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606985" comment="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606986" comment="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606987" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606988" comment="webkit-jsc-4-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606989" comment="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606990" comment="webkit2gtk3-devel-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606991" comment="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3868</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3868" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606980" comment="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606981" comment="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606982" comment="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606983" comment="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606984" comment="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606985" comment="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606986" comment="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606987" comment="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606988" comment="webkit-jsc-4-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606989" comment="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606990" comment="webkit2gtk3-devel-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606991" comment="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3898</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006729.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00040.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170671">SUSE bug 1170671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607631" comment="cups-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607632" comment="cups-client-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607633" comment="cups-config-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607634" comment="cups-ddk-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607635" comment="cups-devel-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607636" comment="cups-devel-32bit-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231804" comment="cups-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607637" comment="libcups2-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607638" comment="libcups2-32bit-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231805" comment="libcups2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607639" comment="libcupscgi1-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177131" comment="libcupscgi1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607640" comment="libcupscgi1-32bit-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231806" comment="libcupscgi1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607641" comment="libcupsimage2-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607642" comment="libcupsimage2-32bit-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231807" comment="libcupsimage2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607643" comment="libcupsmime1-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177133" comment="libcupsmime1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607644" comment="libcupsmime1-32bit-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231808" comment="libcupsmime1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607645" comment="libcupsppdc1-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177134" comment="libcupsppdc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607646" comment="libcupsppdc1-32bit-2.2.7-lp151.6.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231809" comment="libcupsppdc1-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3899</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00015.html" source="SUSE-SU"/>
    <description>
    A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607936" comment="libjavascriptcoregtk-4_0-18-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607937" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607938" comment="libwebkit2gtk-4_0-37-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607939" comment="libwebkit2gtk-4_0-37-32bit-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607940" comment="libwebkit2gtk3-lang-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607941" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607942" comment="typelib-1_0-WebKit2-4_0-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607943" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607944" comment="webkit-jsc-4-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607945" comment="webkit2gtk-4_0-injected-bundles-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607946" comment="webkit2gtk3-devel-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607947" comment="webkit2gtk3-minibrowser-2.28.2-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4030</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4030" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4030" ref_url="https://www.suse.com/security/cve/CVE-2020-4030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4030/">CVE-2020-4030</cve>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4031</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4031" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4031" ref_url="https://www.suse.com/security/cve/CVE-2020-4031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4031/">CVE-2020-4031</cve>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4032</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4032" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4032" ref_url="https://www.suse.com/security/cve/CVE-2020-4032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-4032/">CVE-2020-4032</cve>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4033</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4033" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4033" ref_url="https://www.suse.com/security/cve/CVE-2020-4033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" source="SUSE-SU"/>
    <description>
    In FreeRDP before version 2.1.2, there is an out of bounds read in RLEDECOMPRESS. All FreeRDP based clients with sessions with color depth &lt; 32 are affected. This is fixed in version 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4033/">CVE-2020-4033</cve>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604427" comment="freerdp-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604428" comment="freerdp-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604429" comment="freerdp-proxy-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604430" comment="freerdp-server-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604431" comment="freerdp-wayland-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604432" comment="libfreerdp2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154119" comment="libfreerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604433" comment="libuwac0-0-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604434" comment="libwinpr2-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177198" comment="libwinpr2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604435" comment="uwac0-0-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245864" comment="uwac0-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604436" comment="winpr2-devel-2.1.2-lp151.5.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4044</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-July/015437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007230.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html" source="SUSE-SU"/>
    <description>
    The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044</cve>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609352" comment="libpainter0-0.9.6-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287510" comment="libpainter0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609353" comment="librfxencode0-0.9.6-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287511" comment="librfxencode0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609354" comment="xrdp-0.9.6-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287512" comment="xrdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609355" comment="xrdp-devel-0.9.6-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287513" comment="xrdp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4788</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609518" comment="kernel-debug-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609519" comment="kernel-debug-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609520" comment="kernel-debug-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609521" comment="kernel-default-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609522" comment="kernel-default-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609523" comment="kernel-default-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609524" comment="kernel-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609525" comment="kernel-docs-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609526" comment="kernel-docs-html-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609527" comment="kernel-kvmsmall-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609528" comment="kernel-kvmsmall-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609529" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609530" comment="kernel-macros-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609531" comment="kernel-obs-build-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609532" comment="kernel-obs-qa-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609533" comment="kernel-source-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609534" comment="kernel-source-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609535" comment="kernel-syms-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609536" comment="kernel-vanilla-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609537" comment="kernel-vanilla-base-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609538" comment="kernel-vanilla-devel-4.12.14-lp151.28.91.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5202</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5202" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5202" ref_url="https://www.suse.com/security/cve/CVE-2020-5202" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html" source="SUSE-SU"/>
    <description>
    apt-cacher-ng through 3.3 allows local users to obtain sensitive information by hijacking the hardcoded TCP port. The /usr/lib/apt-cacher-ng/acngtool program attempts to connect to apt-cacher-ng via TCP on localhost port 3142, even if the explicit SocketPath=/var/run/apt-cacher-ng/socket command-line option is passed. The cron job /etc/cron.daily/apt-cacher-ng (which is active by default) attempts this periodically. Because 3142 is an unprivileged port, any local user can try to bind to this port and will receive requests from acngtool. There can be sensitive data in these requests, e.g., if AdminAuth is enabled in /etc/apt-cacher-ng/security.conf. This sensitive data can leak to unprivileged local users that manage to bind to this port before the apt-cacher-ng daemon can.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5202/">CVE-2020-5202</cve>
	<bugzilla href="https://bugzilla.suse.com/1157706">SUSE bug 1157706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604918" comment="apt-cacher-ng-3.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277153" comment="apt-cacher-ng is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5204</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5204" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5204" ref_url="https://www.suse.com/security/cve/CVE-2020-5204" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00034.html" source="SUSE-SU"/>
    <description>
    In uftpd before 2.11, there is a buffer overflow vulnerability in handle_PORT in ftpcmd.c that is caused by a buffer that is 16 bytes large being filled via sprintf() with user input based on the format specifier string %d.%d.%d.%d. The 16 byte size is correct for valid IPv4 addresses (len(&amp;#39;255.255.255.255&amp;#39;) == 16), but the format specifier %d allows more than 3 digits. This has been fixed in version 2.11
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5204/">CVE-2020-5204</cve>
	<bugzilla href="https://bugzilla.suse.com/1160199">SUSE bug 1160199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161667">SUSE bug 1161667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180249">SUSE bug 1180249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608050" comment="uftpd-2.11-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276159" comment="uftpd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5208</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5208" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00031.html" source="SUSE-SU"/>
    <description>
    It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208</cve>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606939" comment="ipmitool-1.8.18-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279130" comment="ipmitool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606940" comment="ipmitool-bmc-snmp-proxy-1.8.18-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279131" comment="ipmitool-bmc-snmp-proxy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5247</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5247" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5247" ref_url="https://www.suse.com/security/cve/CVE-2020-5247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-5247/">CVE-2020-5247</cve>
	<bugzilla href="https://bugzilla.suse.com/1165402">SUSE bug 1165402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165524">SUSE bug 1165524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5249</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5249" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5249" ref_url="https://www.suse.com/security/cve/CVE-2020-5249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.3 and 3.12.4, if an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2020-5247, which fixed this vulnerability but only for regular responses. This has been fixed in 4.3.3 and 3.12.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5249/">CVE-2020-5249</cve>
	<bugzilla href="https://bugzilla.suse.com/1165524">SUSE bug 1165524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5260</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5260" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607692" comment="git-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607693" comment="git-arch-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153608" comment="git-arch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607694" comment="git-core-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607695" comment="git-credential-gnome-keyring-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153609" comment="git-credential-gnome-keyring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607696" comment="git-credential-libsecret-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178167" comment="git-credential-libsecret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607697" comment="git-cvs-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151602" comment="git-cvs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607698" comment="git-daemon-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151603" comment="git-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607699" comment="git-doc-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153610" comment="git-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607700" comment="git-email-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151604" comment="git-email is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607701" comment="git-gui-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151605" comment="git-gui is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607702" comment="git-p4-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178168" comment="git-p4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607703" comment="git-svn-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151606" comment="git-svn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607704" comment="git-web-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151607" comment="git-web is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607705" comment="gitk-2.26.1-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151608" comment="gitk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5267</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5267" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5267" ref_url="https://www.suse.com/security/cve/CVE-2020-5267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5267/">CVE-2020-5267</cve>
	<bugzilla href="https://bugzilla.suse.com/1167240">SUSE bug 1167240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607862" comment="ruby2.5-rubygem-actionview-5_1-5.1.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009282975" comment="ruby2.5-rubygem-actionview-5_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607863" comment="ruby2.5-rubygem-actionview-doc-5_1-5.1.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009282976" comment="ruby2.5-rubygem-actionview-doc-5_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5283</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5283" ref_url="https://www.suse.com/security/cve/CVE-2020-5283" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0084-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFA7OR2MLXELR6A6M634B47K2RIB7LYV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGEO74AOMRFBUZ5VL2QLLN3TAWYC7ZKW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MAJYDJLUUCZVZ2IZJFFWFQ663RENRLLG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2A7TO5T4QEJHRLA7YZBTOPVCY4745TO/" source="SUSE-SU"/>
    <description>
    ViewVC before versions 1.1.28 and 1.2.1 has a XSS vulnerability in CVS show_subdir_lastmod support. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a CVS repository exposed by an otherwise trusted ViewVC instance that also has the `show_subdir_lastmod` feature enabled. The attack vector involves files with unsafe names (names that, when embedded into an HTML stream, would cause the browser to run unwanted code), which themselves can be challenging to create. This vulnerability is patched in versions 1.2.1 and 1.1.28.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5283/">CVE-2020-5283</cve>
	<bugzilla href="https://bugzilla.suse.com/1167974">SUSE bug 1167974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609613" comment="viewvc-1.1.28-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151738" comment="viewvc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5395</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5395" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5395" ref_url="https://www.suse.com/security/cve/CVE-2020-5395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0118-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200118-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZUXEDXI4LMNYPGQ23AHUPAFPEN5QAEZM/" source="SUSE-SU"/>
    <description>
    FontForge 20190801 has a use-after-free in SFD_GetFontMetaData in sfd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5395/">CVE-2020-5395</cve>
	<bugzilla href="https://bugzilla.suse.com/1160220">SUSE bug 1160220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178308">SUSE bug 1178308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606512" comment="fontforge-20170731-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276598" comment="fontforge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606513" comment="fontforge-devel-20170731-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276599" comment="fontforge-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606514" comment="fontforge-doc-20170731-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276600" comment="fontforge-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5496</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5496" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5496" ref_url="https://www.suse.com/security/cve/CVE-2020-5496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0118-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200118-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html" source="SUSE-SU"/>
    <description>
    FontForge 20190801 has a heap-based buffer overflow in the Type2NotDefSplines() function in splinesave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-5496/">CVE-2020-5496</cve>
	<bugzilla href="https://bugzilla.suse.com/1160236">SUSE bug 1160236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609071" comment="fontforge-20170731-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276598" comment="fontforge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609072" comment="fontforge-devel-20170731-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276599" comment="fontforge-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609073" comment="fontforge-doc-20170731-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276600" comment="fontforge-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5504</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5504" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5504" ref_url="https://www.suse.com/security/cve/CVE-2020-5504" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html" source="SUSE-SU"/>
    <description>
    In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5504/">CVE-2020-5504</cve>
	<bugzilla href="https://bugzilla.suse.com/1160456">SUSE bug 1160456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609754" comment="phpMyAdmin-4.9.4-lp151.2.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153097" comment="phpMyAdmin is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6095</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6095" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6095" ref_url="https://www.suse.com/security/cve/CVE-2020-6095" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00029.html" source="SUSE-SU"/>
    <description>
    An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6095/">CVE-2020-6095</cve>
	<bugzilla href="https://bugzilla.suse.com/1168026">SUSE bug 1168026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609947" comment="gstreamer-rtsp-server-devel-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281635" comment="gstreamer-rtsp-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609948" comment="libgstrtspserver-1_0-0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281636" comment="libgstrtspserver-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609949" comment="typelib-1_0-GstRtspServer-1_0-1.12.5-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281637" comment="typelib-1_0-GstRtspServer-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6377</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6377" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6377" ref_url="https://www.suse.com/security/cve/CVE-2020-6377" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 79.0.3945.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6377/">CVE-2020-6377</cve>
	<bugzilla href="https://bugzilla.suse.com/1160337">SUSE bug 1160337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607713" comment="chromedriver-79.0.3945.117-lp151.2.57.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607714" comment="chromium-79.0.3945.117-lp151.2.57.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607715" comment="libre2-0-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170670" comment="libre2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607716" comment="libre2-0-32bit-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170671" comment="libre2-0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607717" comment="re2-devel-20200101-lp151.10.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170673" comment="re2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6378</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6378" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6378" ref_url="https://www.suse.com/security/cve/CVE-2020-6378" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00042.html" source="SUSE-SU"/>
    <description>
    Use after free in speech in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6378/">CVE-2020-6378</cve>
	<bugzilla href="https://bugzilla.suse.com/1161252">SUSE bug 1161252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609950" comment="chromedriver-79.0.3945.130-lp151.2.60.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609951" comment="chromium-79.0.3945.130-lp151.2.60.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6379</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6379" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6379" ref_url="https://www.suse.com/security/cve/CVE-2020-6379" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00042.html" source="SUSE-SU"/>
    <description>
    Use after free in V8 in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6379/">CVE-2020-6379</cve>
	<bugzilla href="https://bugzilla.suse.com/1161252">SUSE bug 1161252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609950" comment="chromedriver-79.0.3945.130-lp151.2.60.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609951" comment="chromium-79.0.3945.130-lp151.2.60.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6380</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6380" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6380" ref_url="https://www.suse.com/security/cve/CVE-2020-6380" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00042.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.130 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6380/">CVE-2020-6380</cve>
	<bugzilla href="https://bugzilla.suse.com/1161252">SUSE bug 1161252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609950" comment="chromedriver-79.0.3945.130-lp151.2.60.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609951" comment="chromium-79.0.3945.130-lp151.2.60.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6381</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6381" ref_url="https://www.suse.com/security/cve/CVE-2020-6381" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6381/">CVE-2020-6381</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6382</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6382" ref_url="https://www.suse.com/security/cve/CVE-2020-6382" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6382/">CVE-2020-6382</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6385</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6385" ref_url="https://www.suse.com/security/cve/CVE-2020-6385" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6385/">CVE-2020-6385</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6387</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6387" ref_url="https://www.suse.com/security/cve/CVE-2020-6387" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6387/">CVE-2020-6387</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6388</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6388" ref_url="https://www.suse.com/security/cve/CVE-2020-6388" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6388/">CVE-2020-6388</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6389</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6389" ref_url="https://www.suse.com/security/cve/CVE-2020-6389" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6389/">CVE-2020-6389</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6390</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6390" ref_url="https://www.suse.com/security/cve/CVE-2020-6390" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6390/">CVE-2020-6390</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6391</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6391" ref_url="https://www.suse.com/security/cve/CVE-2020-6391" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6391/">CVE-2020-6391</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6392</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6392" ref_url="https://www.suse.com/security/cve/CVE-2020-6392" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6392/">CVE-2020-6392</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6393</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6393" ref_url="https://www.suse.com/security/cve/CVE-2020-6393" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6393/">CVE-2020-6393</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6394</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6394" ref_url="https://www.suse.com/security/cve/CVE-2020-6394" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6394/">CVE-2020-6394</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6395</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6395" ref_url="https://www.suse.com/security/cve/CVE-2020-6395" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6395/">CVE-2020-6395</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6396</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6396" ref_url="https://www.suse.com/security/cve/CVE-2020-6396" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6396/">CVE-2020-6396</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6397</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6397" ref_url="https://www.suse.com/security/cve/CVE-2020-6397" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6397/">CVE-2020-6397</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6398</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6398" ref_url="https://www.suse.com/security/cve/CVE-2020-6398" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6398/">CVE-2020-6398</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6399</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6399" ref_url="https://www.suse.com/security/cve/CVE-2020-6399" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6399/">CVE-2020-6399</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6400</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6400" ref_url="https://www.suse.com/security/cve/CVE-2020-6400" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6400/">CVE-2020-6400</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6401</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6401" ref_url="https://www.suse.com/security/cve/CVE-2020-6401" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6401/">CVE-2020-6401</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6402</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6402" ref_url="https://www.suse.com/security/cve/CVE-2020-6402" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6402/">CVE-2020-6402</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6403</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6403" ref_url="https://www.suse.com/security/cve/CVE-2020-6403" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6403/">CVE-2020-6403</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6404</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6404" ref_url="https://www.suse.com/security/cve/CVE-2020-6404" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6404/">CVE-2020-6404</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6405</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6405" ref_url="https://www.suse.com/security/cve/CVE-2020-6405" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6405/">CVE-2020-6405</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6406</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6406" ref_url="https://www.suse.com/security/cve/CVE-2020-6406" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6406/">CVE-2020-6406</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6407</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6407" ref_url="https://www.suse.com/security/cve/CVE-2020-6407" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6407/">CVE-2020-6407</cve>
	<bugzilla href="https://bugzilla.suse.com/1164828">SUSE bug 1164828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606957" comment="chromedriver-80.0.3987.122-lp151.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606958" comment="chromium-80.0.3987.122-lp151.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6408</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6408" ref_url="https://www.suse.com/security/cve/CVE-2020-6408" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6408/">CVE-2020-6408</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6409</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6409" ref_url="https://www.suse.com/security/cve/CVE-2020-6409" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6409/">CVE-2020-6409</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6410</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6410" ref_url="https://www.suse.com/security/cve/CVE-2020-6410" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6410/">CVE-2020-6410</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6411</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6411" ref_url="https://www.suse.com/security/cve/CVE-2020-6411" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6411/">CVE-2020-6411</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6412</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6412" ref_url="https://www.suse.com/security/cve/CVE-2020-6412" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6412/">CVE-2020-6412</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6413</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6413" ref_url="https://www.suse.com/security/cve/CVE-2020-6413" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6413/">CVE-2020-6413</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6414</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6414" ref_url="https://www.suse.com/security/cve/CVE-2020-6414" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6414/">CVE-2020-6414</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6415</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6415" ref_url="https://www.suse.com/security/cve/CVE-2020-6415" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6415/">CVE-2020-6415</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6416</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6416" ref_url="https://www.suse.com/security/cve/CVE-2020-6416" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6416/">CVE-2020-6416</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6417</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6417" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6417" ref_url="https://www.suse.com/security/cve/CVE-2020-6417" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6417/">CVE-2020-6417</cve>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606104" comment="chromedriver-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606105" comment="chromium-80.0.3987.87-lp151.2.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6418</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6418" ref_url="https://www.suse.com/security/cve/CVE-2020-6418" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6418/">CVE-2020-6418</cve>
	<bugzilla href="https://bugzilla.suse.com/1164828">SUSE bug 1164828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606957" comment="chromedriver-80.0.3987.122-lp151.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606958" comment="chromium-80.0.3987.122-lp151.2.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6420</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6420" ref_url="https://www.suse.com/security/cve/CVE-2020-6420" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in media in Google Chrome prior to 80.0.3987.132 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6420/">CVE-2020-6420</cve>
	<bugzilla href="https://bugzilla.suse.com/1165826">SUSE bug 1165826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607023" comment="chromedriver-80.0.3987.132-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607024" comment="chromium-80.0.3987.132-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6422</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6422" ref_url="https://www.suse.com/security/cve/CVE-2020-6422" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Use after free in WebGL in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6422/">CVE-2020-6422</cve>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609801" comment="chromedriver-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609802" comment="chromium-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6423</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6423" ref_url="https://www.suse.com/security/cve/CVE-2020-6423" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6423/">CVE-2020-6423</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6424</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6424" ref_url="https://www.suse.com/security/cve/CVE-2020-6424" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6424/">CVE-2020-6424</cve>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609801" comment="chromedriver-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609802" comment="chromium-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6425</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6425" ref_url="https://www.suse.com/security/cve/CVE-2020-6425" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.149 allowed an attacker who convinced a user to install a malicious extension to bypass site isolation via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6425/">CVE-2020-6425</cve>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609801" comment="chromedriver-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609802" comment="chromium-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6426</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6426" ref_url="https://www.suse.com/security/cve/CVE-2020-6426" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6426/">CVE-2020-6426</cve>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609801" comment="chromedriver-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609802" comment="chromium-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6427</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6427" ref_url="https://www.suse.com/security/cve/CVE-2020-6427" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6427/">CVE-2020-6427</cve>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609801" comment="chromedriver-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609802" comment="chromium-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6428</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6428" ref_url="https://www.suse.com/security/cve/CVE-2020-6428" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6428/">CVE-2020-6428</cve>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609801" comment="chromedriver-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609802" comment="chromium-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6429</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6429" ref_url="https://www.suse.com/security/cve/CVE-2020-6429" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6429/">CVE-2020-6429</cve>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609801" comment="chromedriver-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609802" comment="chromium-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6430</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6430" ref_url="https://www.suse.com/security/cve/CVE-2020-6430" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6430/">CVE-2020-6430</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6431</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6431" ref_url="https://www.suse.com/security/cve/CVE-2020-6431" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in full screen in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6431/">CVE-2020-6431</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6432</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6432" ref_url="https://www.suse.com/security/cve/CVE-2020-6432" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6432/">CVE-2020-6432</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6433</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6433" ref_url="https://www.suse.com/security/cve/CVE-2020-6433" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6433/">CVE-2020-6433</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6434</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6434" ref_url="https://www.suse.com/security/cve/CVE-2020-6434" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Use after free in devtools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6434/">CVE-2020-6434</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6435</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6435" ref_url="https://www.suse.com/security/cve/CVE-2020-6435" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6435/">CVE-2020-6435</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6436</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6436" ref_url="https://www.suse.com/security/cve/CVE-2020-6436" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Use after free in window management in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6436/">CVE-2020-6436</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6437</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6437" ref_url="https://www.suse.com/security/cve/CVE-2020-6437" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebView in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6437/">CVE-2020-6437</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6438</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6438" ref_url="https://www.suse.com/security/cve/CVE-2020-6438" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6438/">CVE-2020-6438</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6439</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6439" ref_url="https://www.suse.com/security/cve/CVE-2020-6439" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6439/">CVE-2020-6439</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6440</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6440" ref_url="https://www.suse.com/security/cve/CVE-2020-6440" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6440/">CVE-2020-6440</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6441</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6441" ref_url="https://www.suse.com/security/cve/CVE-2020-6441" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in omnibox in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6441/">CVE-2020-6441</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6442</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6442" ref_url="https://www.suse.com/security/cve/CVE-2020-6442" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in cache in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6442/">CVE-2020-6442</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6443</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6443" ref_url="https://www.suse.com/security/cve/CVE-2020-6443" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to execute arbitrary code via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6443/">CVE-2020-6443</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6444</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6444" ref_url="https://www.suse.com/security/cve/CVE-2020-6444" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Uninitialized use in WebRTC in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6444/">CVE-2020-6444</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6445</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6445" ref_url="https://www.suse.com/security/cve/CVE-2020-6445" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6445/">CVE-2020-6445</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6446</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6446" ref_url="https://www.suse.com/security/cve/CVE-2020-6446" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6446/">CVE-2020-6446</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6447</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6447" ref_url="https://www.suse.com/security/cve/CVE-2020-6447" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6447/">CVE-2020-6447</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6448</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6448" ref_url="https://www.suse.com/security/cve/CVE-2020-6448" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Use after free in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6448/">CVE-2020-6448</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6449</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6449" ref_url="https://www.suse.com/security/cve/CVE-2020-6449" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6449/">CVE-2020-6449</cve>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609801" comment="chromedriver-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609802" comment="chromium-80.0.3987.149-lp151.2.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6450</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6450" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6450" ref_url="https://www.suse.com/security/cve/CVE-2020-6450" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6450/">CVE-2020-6450</cve>
	<bugzilla href="https://bugzilla.suse.com/1168421">SUSE bug 1168421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6451</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6451" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6451" ref_url="https://www.suse.com/security/cve/CVE-2020-6451" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6451/">CVE-2020-6451</cve>
	<bugzilla href="https://bugzilla.suse.com/1168421">SUSE bug 1168421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6452</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6452" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6452" ref_url="https://www.suse.com/security/cve/CVE-2020-6452" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in media in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6452/">CVE-2020-6452</cve>
	<bugzilla href="https://bugzilla.suse.com/1168421">SUSE bug 1168421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6454</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6454" ref_url="https://www.suse.com/security/cve/CVE-2020-6454" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Use after free in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6454/">CVE-2020-6454</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6455</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6455" ref_url="https://www.suse.com/security/cve/CVE-2020-6455" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in WebSQL in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6455/">CVE-2020-6455</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6456</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6456" ref_url="https://www.suse.com/security/cve/CVE-2020-6456" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in clipboard in Google Chrome prior to 81.0.4044.92 allowed a local attacker to bypass site isolation via crafted clipboard contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6456/">CVE-2020-6456</cve>
	<bugzilla href="https://bugzilla.suse.com/1168911">SUSE bug 1168911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607525" comment="chromedriver-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607526" comment="chromium-81.0.4044.92-lp151.2.77.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6457</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6457" ref_url="https://www.suse.com/security/cve/CVE-2020-6457" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00028.html" source="SUSE-SU"/>
    <description>
    Use after free in speech recognizer in Google Chrome prior to 81.0.4044.113 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6457/">CVE-2020-6457</cve>
	<bugzilla href="https://bugzilla.suse.com/1169729">SUSE bug 1169729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607870" comment="opera-68.0.3618.63-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607545" comment="chromedriver-81.0.4044.113-lp151.2.80.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607546" comment="chromium-81.0.4044.113-lp151.2.80.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6458</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6458" ref_url="https://www.suse.com/security/cve/CVE-2020-6458" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00028.html" source="SUSE-SU"/>
    <description>
    Out of bounds read and write in PDFium in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6458/">CVE-2020-6458</cve>
	<bugzilla href="https://bugzilla.suse.com/1170107">SUSE bug 1170107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607870" comment="opera-68.0.3618.63-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609823" comment="chromedriver-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609824" comment="chromium-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6459</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6459" ref_url="https://www.suse.com/security/cve/CVE-2020-6459" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00028.html" source="SUSE-SU"/>
    <description>
    Use after free in payments in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6459/">CVE-2020-6459</cve>
	<bugzilla href="https://bugzilla.suse.com/1170107">SUSE bug 1170107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607870" comment="opera-68.0.3618.63-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609823" comment="chromedriver-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609824" comment="chromium-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6460</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6460" ref_url="https://www.suse.com/security/cve/CVE-2020-6460" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00028.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in URL formatting in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to perform domain spoofing via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6460/">CVE-2020-6460</cve>
	<bugzilla href="https://bugzilla.suse.com/1170107">SUSE bug 1170107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607870" comment="opera-68.0.3618.63-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609823" comment="chromedriver-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609824" comment="chromium-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6461</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6461" ref_url="https://www.suse.com/security/cve/CVE-2020-6461" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00028.html" source="SUSE-SU"/>
    <description>
    Use after free in storage in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6461/">CVE-2020-6461</cve>
	<bugzilla href="https://bugzilla.suse.com/1170707">SUSE bug 1170707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607870" comment="opera-68.0.3618.63-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6462</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6462" ref_url="https://www.suse.com/security/cve/CVE-2020-6462" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00028.html" source="SUSE-SU"/>
    <description>
    Use after free in task scheduling in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6462/">CVE-2020-6462</cve>
	<bugzilla href="https://bugzilla.suse.com/1170707">SUSE bug 1170707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607870" comment="opera-68.0.3618.63-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609823" comment="chromedriver-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609824" comment="chromium-81.0.4044.129-lp151.2.85.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6463</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<bugzilla href="https://bugzilla.suse.com/1171975">SUSE bug 1171975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604594" comment="MozillaThunderbird-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604595" comment="MozillaThunderbird-translations-common-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604596" comment="MozillaThunderbird-translations-other-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6464</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6464" ref_url="https://www.suse.com/security/cve/CVE-2020-6464" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0917-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html" source="SUSE-SU"/>
    <description>
    Type confusion in Blink in Google Chrome prior to 81.0.4044.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6464/">CVE-2020-6464</cve>
	<bugzilla href="https://bugzilla.suse.com/1171247">SUSE bug 1171247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608114" comment="opera-68.0.3618.104-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607845" comment="chromedriver-81.0.4044.138-lp151.2.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607846" comment="chromium-81.0.4044.138-lp151.2.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6465</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6465" ref_url="https://www.suse.com/security/cve/CVE-2020-6465" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Use after free in reader mode in Google Chrome on Android prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6465/">CVE-2020-6465</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6466</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6466" ref_url="https://www.suse.com/security/cve/CVE-2020-6466" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6466/">CVE-2020-6466</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6467</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6467" ref_url="https://www.suse.com/security/cve/CVE-2020-6467" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6467/">CVE-2020-6467</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6468</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6468" ref_url="https://www.suse.com/security/cve/CVE-2020-6468" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6468/">CVE-2020-6468</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6469</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6469" ref_url="https://www.suse.com/security/cve/CVE-2020-6469" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6469/">CVE-2020-6469</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6470</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6470" ref_url="https://www.suse.com/security/cve/CVE-2020-6470" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in clipboard in Google Chrome prior to 83.0.4103.61 allowed a local attacker to inject arbitrary scripts or HTML (UXSS) via crafted clipboard contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6470/">CVE-2020-6470</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6471</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6471" ref_url="https://www.suse.com/security/cve/CVE-2020-6471" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6471/">CVE-2020-6471</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6472</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6472" ref_url="https://www.suse.com/security/cve/CVE-2020-6472" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory or disk via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6472/">CVE-2020-6472</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6473</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6473" ref_url="https://www.suse.com/security/cve/CVE-2020-6473" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6473/">CVE-2020-6473</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6474</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6474" ref_url="https://www.suse.com/security/cve/CVE-2020-6474" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6474/">CVE-2020-6474</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6475</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6475" ref_url="https://www.suse.com/security/cve/CVE-2020-6475" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Incorrect implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6475/">CVE-2020-6475</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6476</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6476" ref_url="https://www.suse.com/security/cve/CVE-2020-6476" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in tab strip in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6476/">CVE-2020-6476</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6477</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6477" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6477" ref_url="https://www.suse.com/security/cve/CVE-2020-6477" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in installer in Google Chrome on OS X prior to 83.0.4103.61 allowed a local attacker to perform privilege escalation via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6477/">CVE-2020-6477</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6478</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6478" ref_url="https://www.suse.com/security/cve/CVE-2020-6478" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6478/">CVE-2020-6478</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6479</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6479" ref_url="https://www.suse.com/security/cve/CVE-2020-6479" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in sharing in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6479/">CVE-2020-6479</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6480</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6480" ref_url="https://www.suse.com/security/cve/CVE-2020-6480" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in enterprise in Google Chrome prior to 83.0.4103.61 allowed a local attacker to bypass navigation restrictions via UI actions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6480/">CVE-2020-6480</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6481</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6481" ref_url="https://www.suse.com/security/cve/CVE-2020-6481" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in URL formatting in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to perform domain spoofing via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6481/">CVE-2020-6481</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6482</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6482" ref_url="https://www.suse.com/security/cve/CVE-2020-6482" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6482/">CVE-2020-6482</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6483</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6483" ref_url="https://www.suse.com/security/cve/CVE-2020-6483" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in payments in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6483/">CVE-2020-6483</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6484</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6484" ref_url="https://www.suse.com/security/cve/CVE-2020-6484" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in ChromeDriver in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6484/">CVE-2020-6484</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6485</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6485" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6485" ref_url="https://www.suse.com/security/cve/CVE-2020-6485" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in media router in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6485/">CVE-2020-6485</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6486</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6486" ref_url="https://www.suse.com/security/cve/CVE-2020-6486" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in navigations in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6486/">CVE-2020-6486</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6487</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6487" ref_url="https://www.suse.com/security/cve/CVE-2020-6487" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6487/">CVE-2020-6487</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6488</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6488" ref_url="https://www.suse.com/security/cve/CVE-2020-6488" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6488/">CVE-2020-6488</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6489</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6489" ref_url="https://www.suse.com/security/cve/CVE-2020-6489" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in developer tools in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had convinced the user to take certain actions in developer tools to obtain potentially sensitive information from disk via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6489/">CVE-2020-6489</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6490</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6490" ref_url="https://www.suse.com/security/cve/CVE-2020-6490" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in loader in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had been able to write to disk to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6490/">CVE-2020-6490</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6491</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6491" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6491" ref_url="https://www.suse.com/security/cve/CVE-2020-6491" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in site information in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6491/">CVE-2020-6491</cve>
	<bugzilla href="https://bugzilla.suse.com/1171910">SUSE bug 1171910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6493</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6493" ref_url="https://www.suse.com/security/cve/CVE-2020-6493" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Use after free in WebAuthentication in Google Chrome prior to 83.0.4103.97 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6493/">CVE-2020-6493</cve>
	<bugzilla href="https://bugzilla.suse.com/1172496">SUSE bug 1172496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6494</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6494" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6494" ref_url="https://www.suse.com/security/cve/CVE-2020-6494" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in payments in Google Chrome on Android prior to 83.0.4103.97 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6494/">CVE-2020-6494</cve>
	<bugzilla href="https://bugzilla.suse.com/1172496">SUSE bug 1172496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6495</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6495" ref_url="https://www.suse.com/security/cve/CVE-2020-6495" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.97 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6495/">CVE-2020-6495</cve>
	<bugzilla href="https://bugzilla.suse.com/1172496">SUSE bug 1172496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6496</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6496" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6496" ref_url="https://www.suse.com/security/cve/CVE-2020-6496" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
    <description>
    Use after free in payments in Google Chrome on MacOS prior to 83.0.4103.97 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6496/">CVE-2020-6496</cve>
	<bugzilla href="https://bugzilla.suse.com/1172496">SUSE bug 1172496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608832" comment="chromedriver-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608833" comment="chromium-83.0.4103.97-lp151.2.96.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6505</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6505" ref_url="https://www.suse.com/security/cve/CVE-2020-6505" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00061.html" source="SUSE-SU"/>
    <description>
    Use after free in speech in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6505/">CVE-2020-6505</cve>
	<bugzilla href="https://bugzilla.suse.com/1173029">SUSE bug 1173029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608906" comment="chromedriver-83.0.4103.106-lp151.2.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608907" comment="chromium-83.0.4103.106-lp151.2.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6506</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6506" ref_url="https://www.suse.com/security/cve/CVE-2020-6506" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00061.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in WebView in Google Chrome on Android prior to 83.0.4103.106 allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6506/">CVE-2020-6506</cve>
	<bugzilla href="https://bugzilla.suse.com/1173029">SUSE bug 1173029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608906" comment="chromedriver-83.0.4103.106-lp151.2.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608907" comment="chromium-83.0.4103.106-lp151.2.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6507</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6507" ref_url="https://www.suse.com/security/cve/CVE-2020-6507" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00061.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in V8 in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6507/">CVE-2020-6507</cve>
	<bugzilla href="https://bugzilla.suse.com/1173029">SUSE bug 1173029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608906" comment="chromedriver-83.0.4103.106-lp151.2.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608907" comment="chromium-83.0.4103.106-lp151.2.101.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6509</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6509" ref_url="https://www.suse.com/security/cve/CVE-2020-6509" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0949-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Use after free in extensions in Google Chrome prior to 83.0.4103.116 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6509/">CVE-2020-6509</cve>
	<bugzilla href="https://bugzilla.suse.com/1173251">SUSE bug 1173251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609189" comment="opera-69.0.3686.49-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609069" comment="chromedriver-83.0.4103.116-lp151.2.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609070" comment="chromium-83.0.4103.116-lp151.2.106.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6510</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6510" ref_url="https://www.suse.com/security/cve/CVE-2020-6510" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in background fetch in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6510/">CVE-2020-6510</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6511</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6511" ref_url="https://www.suse.com/security/cve/CVE-2020-6511" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Information leak in content security policy in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6511/">CVE-2020-6511</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6512</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6512" ref_url="https://www.suse.com/security/cve/CVE-2020-6512" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6512/">CVE-2020-6512</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6513</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6513" ref_url="https://www.suse.com/security/cve/CVE-2020-6513" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in PDFium in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6513/">CVE-2020-6513</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6514</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604484" comment="MozillaFirefox-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604485" comment="MozillaFirefox-branding-upstream-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604486" comment="MozillaFirefox-buildsymbols-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604487" comment="MozillaFirefox-devel-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604488" comment="MozillaFirefox-translations-common-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604489" comment="MozillaFirefox-translations-other-78.1.0-lp151.2.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604594" comment="MozillaThunderbird-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604595" comment="MozillaThunderbird-translations-common-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604596" comment="MozillaThunderbird-translations-other-68.11.0-lp151.2.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6515</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6515" ref_url="https://www.suse.com/security/cve/CVE-2020-6515" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Use after free in tab strip in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6515/">CVE-2020-6515</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6516</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6516" ref_url="https://www.suse.com/security/cve/CVE-2020-6516" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6516/">CVE-2020-6516</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6517" ref_url="https://www.suse.com/security/cve/CVE-2020-6517" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in history in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6517/">CVE-2020-6517</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6518</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6518" ref_url="https://www.suse.com/security/cve/CVE-2020-6518" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Use after free in developer tools in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had convinced the user to use developer tools to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6518/">CVE-2020-6518</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6519</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6519" ref_url="https://www.suse.com/security/cve/CVE-2020-6519" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6519/">CVE-2020-6519</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6520</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6520" ref_url="https://www.suse.com/security/cve/CVE-2020-6520" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6520/">CVE-2020-6520</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6521</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6521" ref_url="https://www.suse.com/security/cve/CVE-2020-6521" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in autofill in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6521/">CVE-2020-6521</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6522</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6522" ref_url="https://www.suse.com/security/cve/CVE-2020-6522" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in external protocol handlers in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6522/">CVE-2020-6522</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6523</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6523" ref_url="https://www.suse.com/security/cve/CVE-2020-6523" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6523/">CVE-2020-6523</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6524</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6524" ref_url="https://www.suse.com/security/cve/CVE-2020-6524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in WebAudio in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6524/">CVE-2020-6524</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6525</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6525" ref_url="https://www.suse.com/security/cve/CVE-2020-6525" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6525/">CVE-2020-6525</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6526</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6526" ref_url="https://www.suse.com/security/cve/CVE-2020-6526" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in iframe sandbox in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6526/">CVE-2020-6526</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6527</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6527" ref_url="https://www.suse.com/security/cve/CVE-2020-6527" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6527/">CVE-2020-6527</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6528</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6528" ref_url="https://www.suse.com/security/cve/CVE-2020-6528" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in basic auth in Google Chrome on iOS prior to 84.0.4147.89 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6528/">CVE-2020-6528</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6529</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6529" ref_url="https://www.suse.com/security/cve/CVE-2020-6529" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6529/">CVE-2020-6529</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6530</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6530" ref_url="https://www.suse.com/security/cve/CVE-2020-6530" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in developer tools in Google Chrome prior to 84.0.4147.89 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6530/">CVE-2020-6530</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6531</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6531" ref_url="https://www.suse.com/security/cve/CVE-2020-6531" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in scroll to text in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6531/">CVE-2020-6531</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6532</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6532" ref_url="https://www.suse.com/security/cve/CVE-2020-6532" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in SCTP in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6532/">CVE-2020-6532</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609952" comment="chromedriver-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609953" comment="chromium-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6533</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6533" ref_url="https://www.suse.com/security/cve/CVE-2020-6533" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6533/">CVE-2020-6533</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6534</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6534" ref_url="https://www.suse.com/security/cve/CVE-2020-6534" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in WebRTC in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6534/">CVE-2020-6534</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6535</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6535" ref_url="https://www.suse.com/security/cve/CVE-2020-6535" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in WebUI in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had compromised the renderer process to inject scripts or HTML into a privileged page via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6535/">CVE-2020-6535</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6536</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6536" ref_url="https://www.suse.com/security/cve/CVE-2020-6536" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in PWAs in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had persuaded the user to install a PWA to spoof the contents of the Omnibox (URL bar) via a crafted PWA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6536/">CVE-2020-6536</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604490" comment="opera-70.0.3728.71-lp151.2.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604364" comment="chromedriver-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604365" comment="chromium-84.0.4147.89-lp151.2.109.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6537</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6537" ref_url="https://www.suse.com/security/cve/CVE-2020-6537" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Type confusion in V8 in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6537/">CVE-2020-6537</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609952" comment="chromedriver-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609953" comment="chromium-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6538</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6538" ref_url="https://www.suse.com/security/cve/CVE-2020-6538" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebView in Google Chrome on Android prior to 84.0.4147.105 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6538/">CVE-2020-6538</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609952" comment="chromedriver-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609953" comment="chromium-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6539</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6539" ref_url="https://www.suse.com/security/cve/CVE-2020-6539" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in CSS in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6539/">CVE-2020-6539</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609952" comment="chromedriver-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609953" comment="chromium-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6540</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6540" ref_url="https://www.suse.com/security/cve/CVE-2020-6540" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Skia in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6540/">CVE-2020-6540</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609952" comment="chromedriver-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609953" comment="chromium-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6541</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6541" ref_url="https://www.suse.com/security/cve/CVE-2020-6541" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in WebUSB in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6541/">CVE-2020-6541</cve>
	<bugzilla href="https://bugzilla.suse.com/1174582">SUSE bug 1174582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609952" comment="chromedriver-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609953" comment="chromium-84.0.4147.105-lp151.2.112.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6542</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6542" ref_url="https://www.suse.com/security/cve/CVE-2020-6542" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in ANGLE in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6542/">CVE-2020-6542</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6543</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6543" ref_url="https://www.suse.com/security/cve/CVE-2020-6543" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in task scheduling in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6543/">CVE-2020-6543</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6544</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6544" ref_url="https://www.suse.com/security/cve/CVE-2020-6544" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6544/">CVE-2020-6544</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6545</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6545" ref_url="https://www.suse.com/security/cve/CVE-2020-6545" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6545/">CVE-2020-6545</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6546</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6546" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6546" ref_url="https://www.suse.com/security/cve/CVE-2020-6546" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in installer in Google Chrome prior to 84.0.4147.125 allowed a local attacker to potentially elevate privilege via a crafted filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6546/">CVE-2020-6546</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6547</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6547" ref_url="https://www.suse.com/security/cve/CVE-2020-6547" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Incorrect security UI in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially obtain sensitive information via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6547/">CVE-2020-6547</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6548</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6548" ref_url="https://www.suse.com/security/cve/CVE-2020-6548" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.125 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6548/">CVE-2020-6548</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6549</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6549" ref_url="https://www.suse.com/security/cve/CVE-2020-6549" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-6549/">CVE-2020-6549</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6550</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6550" ref_url="https://www.suse.com/security/cve/CVE-2020-6550" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in IndexedDB in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6550/">CVE-2020-6550</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6551</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6551" ref_url="https://www.suse.com/security/cve/CVE-2020-6551" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in WebXR in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6551/">CVE-2020-6551</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6552</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6552" ref_url="https://www.suse.com/security/cve/CVE-2020-6552" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-6552/">CVE-2020-6552</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6553</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6553" ref_url="https://www.suse.com/security/cve/CVE-2020-6553" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in offline mode in Google Chrome on iOS prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-6553/">CVE-2020-6553</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6554</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6554" ref_url="https://www.suse.com/security/cve/CVE-2020-6554" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Use after free in extensions in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6554/">CVE-2020-6554</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6555</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6555" ref_url="https://www.suse.com/security/cve/CVE-2020-6555" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00006.html" source="SUSE-SU"/>
    <description>
    Out of bounds read in WebGL in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6555/">CVE-2020-6555</cve>
	<bugzilla href="https://bugzilla.suse.com/1175085">SUSE bug 1175085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605045" comment="opera-70.0.3728.133-lp151.2.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609954" comment="chromedriver-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609955" comment="chromium-84.0.4147.125-lp151.2.115.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6556</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6556" ref_url="https://www.suse.com/security/cve/CVE-2020-6556" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-6556/">CVE-2020-6556</cve>
	<bugzilla href="https://bugzilla.suse.com/1175505">SUSE bug 1175505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604981" comment="chromedriver-84.0.4147.135-lp151.2.120.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604982" comment="chromium-84.0.4147.135-lp151.2.120.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6557</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6557" ref_url="https://www.suse.com/security/cve/CVE-2020-6557" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6557/">CVE-2020-6557</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609871" comment="chromedriver-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609872" comment="chromium-86.0.4240.75-lp151.2.144.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609873" comment="gn-0.1807-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296733" comment="gn is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6558</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6558" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6558" ref_url="https://www.suse.com/security/cve/CVE-2020-6558" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in iOSWeb in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6558/">CVE-2020-6558</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6559</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6559" ref_url="https://www.suse.com/security/cve/CVE-2020-6559" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Use after free in presentation API in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6559/">CVE-2020-6559</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6560</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6560" ref_url="https://www.suse.com/security/cve/CVE-2020-6560" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in autofill in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6560/">CVE-2020-6560</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6561</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6561" ref_url="https://www.suse.com/security/cve/CVE-2020-6561" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Content Security Policy in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6561/">CVE-2020-6561</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6562</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6562" ref_url="https://www.suse.com/security/cve/CVE-2020-6562" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Blink in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6562/">CVE-2020-6562</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6563</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6563" ref_url="https://www.suse.com/security/cve/CVE-2020-6563" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6563/">CVE-2020-6563</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6564</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6564" ref_url="https://www.suse.com/security/cve/CVE-2020-6564" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6564/">CVE-2020-6564</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6565</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6565" ref_url="https://www.suse.com/security/cve/CVE-2020-6565" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6565/">CVE-2020-6565</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6566</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6566" ref_url="https://www.suse.com/security/cve/CVE-2020-6566" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6566/">CVE-2020-6566</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6567</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6567" ref_url="https://www.suse.com/security/cve/CVE-2020-6567" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6567/">CVE-2020-6567</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6568</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6568" ref_url="https://www.suse.com/security/cve/CVE-2020-6568" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6568/">CVE-2020-6568</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6569</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6569" ref_url="https://www.suse.com/security/cve/CVE-2020-6569" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Integer overflow in WebUSB in Google Chrome prior to 85.0.4183.83 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6569/">CVE-2020-6569</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6570</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6570" ref_url="https://www.suse.com/security/cve/CVE-2020-6570" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Information leakage in WebRTC in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information via a crafted WebRTC interaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6570/">CVE-2020-6570</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6571</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6571" ref_url="https://www.suse.com/security/cve/CVE-2020-6571" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
    <description>
    Insufficient data validation in Omnibox in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6571/">CVE-2020-6571</cve>
	<bugzilla href="https://bugzilla.suse.com/1175757">SUSE bug 1175757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6573</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6573" ref_url="https://www.suse.com/security/cve/CVE-2020-6573" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6573/">CVE-2020-6573</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6574</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6574" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6574" ref_url="https://www.suse.com/security/cve/CVE-2020-6574" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in installer in Google Chrome on OS X prior to 85.0.4183.102 allowed a local attacker to potentially achieve privilege escalation via a crafted binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6574/">CVE-2020-6574</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6575</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6575" ref_url="https://www.suse.com/security/cve/CVE-2020-6575" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Race in Mojo in Google Chrome prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6575/">CVE-2020-6575</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6576</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6576" ref_url="https://www.suse.com/security/cve/CVE-2020-6576" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html" source="SUSE-SU"/>
    <description>
    Use after free in offscreen canvas in Google Chrome prior to 85.0.4183.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6576/">CVE-2020-6576</cve>
	<bugzilla href="https://bugzilla.suse.com/1176306">SUSE bug 1176306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609868" comment="opera-71.0.3770.228-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609866" comment="chromedriver-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609867" comment="chromium-85.0.4183.102-lp151.2.133.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6609</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6609" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6609" ref_url="https://www.suse.com/security/cve/CVE-2020-6609" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" source="SUSE-SU"/>
    <description>
    GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in read_pages_map in decode_r2007.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6609/">CVE-2020-6609</cve>
	<bugzilla href="https://bugzilla.suse.com/1160520">SUSE bug 1160520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609227" comment="libredwg-devel-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609228" comment="libredwg-tools-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609229" comment="libredwg0-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6610</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6610" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6610" ref_url="https://www.suse.com/security/cve/CVE-2020-6610" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" source="SUSE-SU"/>
    <description>
    GNU LibreDWG 0.9.3.2564 has an attempted excessive memory allocation in read_sections_map in decode_r2007.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6610/">CVE-2020-6610</cve>
	<bugzilla href="https://bugzilla.suse.com/1160522">SUSE bug 1160522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609227" comment="libredwg-devel-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609228" comment="libredwg-tools-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609229" comment="libredwg0-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6611</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6611" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6611" ref_url="https://www.suse.com/security/cve/CVE-2020-6611" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" source="SUSE-SU"/>
    <description>
    GNU LibreDWG 0.9.3.2564 has a NULL pointer dereference in get_next_owned_entity in dwg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6611/">CVE-2020-6611</cve>
	<bugzilla href="https://bugzilla.suse.com/1160523">SUSE bug 1160523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609227" comment="libredwg-devel-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609228" comment="libredwg-tools-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609229" comment="libredwg0-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6612</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6612" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6612" ref_url="https://www.suse.com/security/cve/CVE-2020-6612" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" source="SUSE-SU"/>
    <description>
    GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in copy_compressed_bytes in decode_r2007.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6612/">CVE-2020-6612</cve>
	<bugzilla href="https://bugzilla.suse.com/1160524">SUSE bug 1160524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609227" comment="libredwg-devel-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609228" comment="libredwg-tools-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609229" comment="libredwg0-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6613</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6613" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6613" ref_url="https://www.suse.com/security/cve/CVE-2020-6613" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" source="SUSE-SU"/>
    <description>
    GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bit_search_sentinel in bits.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6613/">CVE-2020-6613</cve>
	<bugzilla href="https://bugzilla.suse.com/1160525">SUSE bug 1160525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609227" comment="libredwg-devel-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609228" comment="libredwg-tools-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609229" comment="libredwg0-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6614</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6614" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6614" ref_url="https://www.suse.com/security/cve/CVE-2020-6614" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" source="SUSE-SU"/>
    <description>
    GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6614/">CVE-2020-6614</cve>
	<bugzilla href="https://bugzilla.suse.com/1160526">SUSE bug 1160526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609227" comment="libredwg-devel-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609228" comment="libredwg-tools-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609229" comment="libredwg0-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6615</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6615" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6615" ref_url="https://www.suse.com/security/cve/CVE-2020-6615" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00052.html" source="SUSE-SU"/>
    <description>
    GNU LibreDWG 0.9.3.2564 has an invalid pointer dereference in dwg_dynapi_entity_value in dynapi.c (dynapi.c is generated by gen-dynapi.pl).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6615/">CVE-2020-6615</cve>
	<bugzilla href="https://bugzilla.suse.com/1160527">SUSE bug 1160527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609227" comment="libredwg-devel-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276137" comment="libredwg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609228" comment="libredwg-tools-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276138" comment="libredwg-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609229" comment="libredwg0-0.10-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276139" comment="libredwg0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6792</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6792" ref_url="https://www.suse.com/security/cve/CVE-2020-6792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    When deriving an identifier for an email message, uninitialized memory was used in addition to the message contents. This vulnerability affects Thunderbird &lt; 68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6792/">CVE-2020-6792</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606864" comment="MozillaThunderbird-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606865" comment="MozillaThunderbird-translations-common-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606866" comment="MozillaThunderbird-translations-other-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6793</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6793" ref_url="https://www.suse.com/security/cve/CVE-2020-6793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    When processing an email message with an ill-formed envelope, Thunderbird could read data from a random memory location. This vulnerability affects Thunderbird &lt; 68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6793/">CVE-2020-6793</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606864" comment="MozillaThunderbird-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606865" comment="MozillaThunderbird-translations-common-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606866" comment="MozillaThunderbird-translations-other-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6794</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6794" ref_url="https://www.suse.com/security/cve/CVE-2020-6794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    If a user saved passwords before Thunderbird 60 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Thunderbird 60. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Thunderbird &lt; 68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6794/">CVE-2020-6794</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606864" comment="MozillaThunderbird-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606865" comment="MozillaThunderbird-translations-common-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606866" comment="MozillaThunderbird-translations-other-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6795</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6795" ref_url="https://www.suse.com/security/cve/CVE-2020-6795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    When processing a message that contains multiple S/MIME signatures, a bug in the MIME processing code caused a null pointer dereference, leading to an unexploitable crash. This vulnerability affects Thunderbird &lt; 68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6795/">CVE-2020-6795</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606864" comment="MozillaThunderbird-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606865" comment="MozillaThunderbird-translations-common-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606866" comment="MozillaThunderbird-translations-other-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6796</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
    <description>
    A content process could have modified shared memory relating to crash reporting information, crash itself, and cause an out-of-bound write. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 73 and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606815" comment="MozillaFirefox-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606816" comment="MozillaFirefox-branding-upstream-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606817" comment="MozillaFirefox-buildsymbols-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606818" comment="MozillaFirefox-devel-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606819" comment="MozillaFirefox-translations-common-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606820" comment="MozillaFirefox-translations-other-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6797</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6797" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    By downloading a file with the .fileloc extension, a semi-privileged extension could launch an arbitrary application on the user's computer. The attacker is restricted as they are unable to download non-quarantined files or supply command line arguments to the application, limiting the impact. Note: this issue only occurs on Mac OSX. Other operating systems are unaffected. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606815" comment="MozillaFirefox-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606816" comment="MozillaFirefox-branding-upstream-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606817" comment="MozillaFirefox-buildsymbols-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606818" comment="MozillaFirefox-devel-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606819" comment="MozillaFirefox-translations-common-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606820" comment="MozillaFirefox-translations-other-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606864" comment="MozillaThunderbird-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606865" comment="MozillaThunderbird-translations-common-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606866" comment="MozillaThunderbird-translations-other-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6798</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but is potentially a risk in browser or browser-like contexts. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606815" comment="MozillaFirefox-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606816" comment="MozillaFirefox-branding-upstream-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606817" comment="MozillaFirefox-buildsymbols-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606818" comment="MozillaFirefox-devel-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606819" comment="MozillaFirefox-translations-common-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606820" comment="MozillaFirefox-translations-other-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606864" comment="MozillaThunderbird-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606865" comment="MozillaThunderbird-translations-common-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606866" comment="MozillaThunderbird-translations-other-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6799</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6799" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 73 and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606815" comment="MozillaFirefox-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606816" comment="MozillaFirefox-branding-upstream-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606817" comment="MozillaFirefox-buildsymbols-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606818" comment="MozillaFirefox-devel-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606819" comment="MozillaFirefox-translations-common-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606820" comment="MozillaFirefox-translations-other-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6800</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 72 and Firefox ESR 68.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606815" comment="MozillaFirefox-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606816" comment="MozillaFirefox-branding-upstream-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606817" comment="MozillaFirefox-buildsymbols-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606818" comment="MozillaFirefox-devel-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606819" comment="MozillaFirefox-translations-common-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606820" comment="MozillaFirefox-translations-other-68.5.0-lp151.2.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606864" comment="MozillaThunderbird-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606865" comment="MozillaThunderbird-translations-common-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606866" comment="MozillaThunderbird-translations-other-68.5.0-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6802" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6802" ref_url="https://www.suse.com/security/cve/CVE-2020-6802" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00018.html" source="SUSE-SU"/>
    <description>
    In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with noscript and a raw tag in the allowed/whitelisted tags option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6802/">CVE-2020-6802</cve>
	<bugzilla href="https://bugzilla.suse.com/1165303">SUSE bug 1165303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607015" comment="python2-bleach-3.1.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279500" comment="python2-bleach is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607016" comment="python3-bleach-3.1.1-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279501" comment="python3-bleach is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6805</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607063" comment="MozillaFirefox-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607064" comment="MozillaFirefox-branding-upstream-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607065" comment="MozillaFirefox-buildsymbols-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607066" comment="MozillaFirefox-devel-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607067" comment="MozillaFirefox-translations-common-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607068" comment="MozillaFirefox-translations-other-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607177" comment="MozillaThunderbird-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607178" comment="MozillaThunderbird-translations-common-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607179" comment="MozillaThunderbird-translations-other-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6806</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607063" comment="MozillaFirefox-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607064" comment="MozillaFirefox-branding-upstream-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607065" comment="MozillaFirefox-buildsymbols-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607066" comment="MozillaFirefox-devel-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607067" comment="MozillaFirefox-translations-common-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607068" comment="MozillaFirefox-translations-other-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607177" comment="MozillaThunderbird-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607178" comment="MozillaThunderbird-translations-common-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607179" comment="MozillaThunderbird-translations-other-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6807</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    When a device was changed while a stream was about to be destroyed, the &lt;code&gt;stream-reinit&lt;/code&gt; task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607063" comment="MozillaFirefox-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607064" comment="MozillaFirefox-branding-upstream-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607065" comment="MozillaFirefox-buildsymbols-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607066" comment="MozillaFirefox-devel-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607067" comment="MozillaFirefox-translations-common-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607068" comment="MozillaFirefox-translations-other-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607177" comment="MozillaThunderbird-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607178" comment="MozillaThunderbird-translations-common-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607179" comment="MozillaThunderbird-translations-other-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6811</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607063" comment="MozillaFirefox-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607064" comment="MozillaFirefox-branding-upstream-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607065" comment="MozillaFirefox-buildsymbols-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607066" comment="MozillaFirefox-devel-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607067" comment="MozillaFirefox-translations-common-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607068" comment="MozillaFirefox-translations-other-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607177" comment="MozillaThunderbird-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607178" comment="MozillaThunderbird-translations-common-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607179" comment="MozillaThunderbird-translations-other-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6812</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607063" comment="MozillaFirefox-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607064" comment="MozillaFirefox-branding-upstream-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607065" comment="MozillaFirefox-buildsymbols-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607066" comment="MozillaFirefox-devel-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607067" comment="MozillaFirefox-translations-common-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607068" comment="MozillaFirefox-translations-other-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607177" comment="MozillaThunderbird-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607178" comment="MozillaThunderbird-translations-common-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607179" comment="MozillaThunderbird-translations-other-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6814</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox and Thunderbird 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607063" comment="MozillaFirefox-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607064" comment="MozillaFirefox-branding-upstream-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607065" comment="MozillaFirefox-buildsymbols-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607066" comment="MozillaFirefox-devel-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607067" comment="MozillaFirefox-translations-common-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607068" comment="MozillaFirefox-translations-other-68.6.0-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607177" comment="MozillaThunderbird-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607178" comment="MozillaThunderbird-translations-common-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607179" comment="MozillaThunderbird-translations-other-68.6.0-lp151.2.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6819</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0461-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox &lt; 74.0.1, and Firefox ESR &lt; 68.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607358" comment="MozillaFirefox-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607359" comment="MozillaFirefox-branding-upstream-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607360" comment="MozillaFirefox-buildsymbols-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607361" comment="MozillaFirefox-devel-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607362" comment="MozillaFirefox-translations-common-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607363" comment="MozillaFirefox-translations-other-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607580" comment="MozillaThunderbird-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607581" comment="MozillaThunderbird-translations-common-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607582" comment="MozillaThunderbird-translations-other-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6820</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0461-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox &lt; 74.0.1, and Firefox ESR &lt; 68.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607358" comment="MozillaFirefox-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607359" comment="MozillaFirefox-branding-upstream-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607360" comment="MozillaFirefox-buildsymbols-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607361" comment="MozillaFirefox-devel-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607362" comment="MozillaFirefox-translations-common-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607363" comment="MozillaFirefox-translations-other-68.6.1-lp151.2.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607580" comment="MozillaThunderbird-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607581" comment="MozillaThunderbird-translations-common-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607582" comment="MozillaThunderbird-translations-other-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6821</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    When reading from areas partially or fully outside the source resource with WebGL's &lt;code&gt;copyTexSubImage&lt;/code&gt; method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox ESR &lt; 68.7, and Firefox &lt; 75.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607430" comment="MozillaFirefox-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607431" comment="MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607432" comment="MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607433" comment="MozillaFirefox-devel-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607434" comment="MozillaFirefox-translations-common-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607435" comment="MozillaFirefox-translations-other-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607580" comment="MozillaThunderbird-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607581" comment="MozillaThunderbird-translations-common-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607582" comment="MozillaThunderbird-translations-other-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6822</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in &lt;code&gt;GMPDecodeData&lt;/code&gt;. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox ESR &lt; 68.7, and Firefox &lt; 75.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607430" comment="MozillaFirefox-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607431" comment="MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607432" comment="MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607433" comment="MozillaFirefox-devel-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607434" comment="MozillaFirefox-translations-common-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607435" comment="MozillaFirefox-translations-other-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607580" comment="MozillaThunderbird-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607581" comment="MozillaThunderbird-translations-common-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607582" comment="MozillaThunderbird-translations-other-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6825</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox ESR &lt; 68.7, and Firefox &lt; 75.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607430" comment="MozillaFirefox-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607431" comment="MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607432" comment="MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607433" comment="MozillaFirefox-devel-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607434" comment="MozillaFirefox-translations-common-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607435" comment="MozillaFirefox-translations-other-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607580" comment="MozillaThunderbird-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607581" comment="MozillaThunderbird-translations-common-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607582" comment="MozillaThunderbird-translations-other-68.7.0-lp151.2.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6827</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6827" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
    <description>
    When following a link that opened an intent://-schemed URL, causing a custom tab to be opened, Firefox for Android could be tricked into displaying the incorrect URI. &lt;br&gt; *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607430" comment="MozillaFirefox-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607431" comment="MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607432" comment="MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607433" comment="MozillaFirefox-devel-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607434" comment="MozillaFirefox-translations-common-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607435" comment="MozillaFirefox-translations-other-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6828</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6828" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
    <description>
    A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user's profile directory. One exploitation vector for this would be to supply a user.js file providing arbitrary malicious preference values. Control of arbitrary preferences can lead to sufficient compromise such that it is generally equivalent to arbitrary code execution.&lt;br&gt; *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607430" comment="MozillaFirefox-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607431" comment="MozillaFirefox-branding-upstream-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607432" comment="MozillaFirefox-buildsymbols-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607433" comment="MozillaFirefox-devel-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607434" comment="MozillaFirefox-translations-common-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607435" comment="MozillaFirefox-translations-other-68.7.0-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6831</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0917-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html" source="SUSE-SU"/>
    <description>
    A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171247">SUSE bug 1171247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608114" comment="opera-68.0.3618.104-lp151.2.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607847" comment="MozillaFirefox-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607848" comment="MozillaFirefox-branding-upstream-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607849" comment="MozillaFirefox-buildsymbols-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607850" comment="MozillaFirefox-devel-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607851" comment="MozillaFirefox-translations-common-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607852" comment="MozillaFirefox-translations-other-68.8.0-lp151.2.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607933" comment="MozillaThunderbird-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607934" comment="MozillaThunderbird-translations-common-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607935" comment="MozillaThunderbird-translations-other-68.8.0-lp151.2.38.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607845" comment="chromedriver-81.0.4044.138-lp151.2.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607846" comment="chromium-81.0.4044.138-lp151.2.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7039</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607382" comment="qemu-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607383" comment="qemu-arm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607384" comment="qemu-audio-alsa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607385" comment="qemu-audio-oss-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607386" comment="qemu-audio-pa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607387" comment="qemu-audio-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607388" comment="qemu-block-curl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607389" comment="qemu-block-dmg-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607390" comment="qemu-block-gluster-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607391" comment="qemu-block-iscsi-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607392" comment="qemu-block-nfs-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607393" comment="qemu-block-rbd-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607394" comment="qemu-block-ssh-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607395" comment="qemu-extra-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607396" comment="qemu-guest-agent-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607397" comment="qemu-ipxe-1.0.0+-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607398" comment="qemu-ksm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607399" comment="qemu-kvm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607400" comment="qemu-lang-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607401" comment="qemu-linux-user-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607402" comment="qemu-ppc-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607403" comment="qemu-s390-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607404" comment="qemu-seabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607405" comment="qemu-sgabios-8-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607406" comment="qemu-tools-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607407" comment="qemu-ui-curses-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607408" comment="qemu-ui-gtk-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607409" comment="qemu-ui-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607410" comment="qemu-vgabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607411" comment="qemu-x86-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7040</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7040" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7040" ref_url="https://www.suse.com/security/cve/CVE-2020-7040" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00054.html" source="SUSE-SU"/>
    <description>
    storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-7040/">CVE-2020-7040</cve>
	<bugzilla href="https://bugzilla.suse.com/1150555">SUSE bug 1150555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156767">SUSE bug 1156767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609956" comment="storeBackup-3.5-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277118" comment="storeBackup is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7041</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7041" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7041" ref_url="https://www.suse.com/security/cve/CVE-2020-7041" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7041/">CVE-2020-7041</cve>
	<bugzilla href="https://bugzilla.suse.com/1165299">SUSE bug 1165299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607011" comment="openfortivpn-1.12.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279424" comment="openfortivpn is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7042</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7042" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7042" ref_url="https://www.suse.com/security/cve/CVE-2020-7042" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7042/">CVE-2020-7042</cve>
	<bugzilla href="https://bugzilla.suse.com/1165300">SUSE bug 1165300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607011" comment="openfortivpn-1.12.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279424" comment="openfortivpn is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7043</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7043" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7043" ref_url="https://www.suse.com/security/cve/CVE-2020-7043" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL before 1.0.2. tunnel.c mishandles certificate validation because hostname comparisons do not consider '\0' characters, as demonstrated by a good.example.com\x00evil.example.com attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7043/">CVE-2020-7043</cve>
	<bugzilla href="https://bugzilla.suse.com/1165301">SUSE bug 1165301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607011" comment="openfortivpn-1.12.0-lp151.2.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279424" comment="openfortivpn is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7044</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7044" ref_url="https://www.suse.com/security/cve/CVE-2020-7044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.x before 3.2.1, the WASSP dissector could crash. This was addressed in epan/dissectors/packet-wassp.c by using &gt;= and &lt;= to resolve off-by-one errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7044/">CVE-2020-7044</cve>
	<bugzilla href="https://bugzilla.suse.com/1161052">SUSE bug 1161052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7053</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7053" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7053" ref_url="https://www.suse.com/security/cve/CVE-2020-7053" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7053/">CVE-2020-7053</cve>
	<bugzilla href="https://bugzilla.suse.com/1160966">SUSE bug 1160966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7059</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7059" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7059" ref_url="https://www.suse.com/security/cve/CVE-2020-7059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006513.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html" source="SUSE-SU"/>
    <description>
    When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7059/">CVE-2020-7059</cve>
	<bugzilla href="https://bugzilla.suse.com/1162629">SUSE bug 1162629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607069" comment="apache2-mod_php7-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607070" comment="php7-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607071" comment="php7-bcmath-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607072" comment="php7-bz2-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607073" comment="php7-calendar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607074" comment="php7-ctype-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607075" comment="php7-curl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607076" comment="php7-dba-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607077" comment="php7-devel-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607078" comment="php7-dom-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607079" comment="php7-embed-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607080" comment="php7-enchant-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607081" comment="php7-exif-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607082" comment="php7-fastcgi-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607083" comment="php7-fileinfo-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607084" comment="php7-firebird-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607085" comment="php7-fpm-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607086" comment="php7-ftp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607087" comment="php7-gd-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607088" comment="php7-gettext-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607089" comment="php7-gmp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607090" comment="php7-iconv-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607091" comment="php7-intl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607092" comment="php7-json-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607093" comment="php7-ldap-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607094" comment="php7-mbstring-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607095" comment="php7-mysql-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607096" comment="php7-odbc-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607097" comment="php7-opcache-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607098" comment="php7-openssl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607099" comment="php7-pcntl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607100" comment="php7-pdo-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607101" comment="php7-pear-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607102" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607103" comment="php7-pgsql-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607104" comment="php7-phar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607105" comment="php7-posix-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607106" comment="php7-readline-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607107" comment="php7-shmop-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607108" comment="php7-snmp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607109" comment="php7-soap-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607110" comment="php7-sockets-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607111" comment="php7-sodium-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607112" comment="php7-sqlite-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607113" comment="php7-sysvmsg-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607114" comment="php7-sysvsem-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607115" comment="php7-sysvshm-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607116" comment="php7-test-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607117" comment="php7-tidy-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607118" comment="php7-tokenizer-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607119" comment="php7-wddx-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607120" comment="php7-xmlreader-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607121" comment="php7-xmlrpc-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607122" comment="php7-xmlwriter-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607123" comment="php7-xsl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607124" comment="php7-zip-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607125" comment="php7-zlib-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7060</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7060" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7060" ref_url="https://www.suse.com/security/cve/CVE-2020-7060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html" source="SUSE-SU"/>
    <description>
    When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7060/">CVE-2020-7060</cve>
	<bugzilla href="https://bugzilla.suse.com/1162632">SUSE bug 1162632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607069" comment="apache2-mod_php7-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607070" comment="php7-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607071" comment="php7-bcmath-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607072" comment="php7-bz2-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607073" comment="php7-calendar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607074" comment="php7-ctype-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607075" comment="php7-curl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607076" comment="php7-dba-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607077" comment="php7-devel-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607078" comment="php7-dom-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607079" comment="php7-embed-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607080" comment="php7-enchant-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607081" comment="php7-exif-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607082" comment="php7-fastcgi-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607083" comment="php7-fileinfo-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607084" comment="php7-firebird-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607085" comment="php7-fpm-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607086" comment="php7-ftp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607087" comment="php7-gd-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607088" comment="php7-gettext-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607089" comment="php7-gmp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607090" comment="php7-iconv-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607091" comment="php7-intl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607092" comment="php7-json-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607093" comment="php7-ldap-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607094" comment="php7-mbstring-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607095" comment="php7-mysql-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607096" comment="php7-odbc-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607097" comment="php7-opcache-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607098" comment="php7-openssl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607099" comment="php7-pcntl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607100" comment="php7-pdo-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607101" comment="php7-pear-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607102" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607103" comment="php7-pgsql-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607104" comment="php7-phar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607105" comment="php7-posix-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607106" comment="php7-readline-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607107" comment="php7-shmop-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607108" comment="php7-snmp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607109" comment="php7-soap-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607110" comment="php7-sockets-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607111" comment="php7-sodium-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607112" comment="php7-sqlite-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607113" comment="php7-sysvmsg-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607114" comment="php7-sysvsem-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607115" comment="php7-sysvshm-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607116" comment="php7-test-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607117" comment="php7-tidy-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607118" comment="php7-tokenizer-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607119" comment="php7-wddx-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607120" comment="php7-xmlreader-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607121" comment="php7-xmlrpc-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607122" comment="php7-xmlwriter-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607123" comment="php7-xsl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607124" comment="php7-zip-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607125" comment="php7-zlib-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7062</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7062" ref_url="https://www.suse.com/security/cve/CVE-2020-7062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7062/">CVE-2020-7062</cve>
	<bugzilla href="https://bugzilla.suse.com/1165280">SUSE bug 1165280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607069" comment="apache2-mod_php7-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607070" comment="php7-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607071" comment="php7-bcmath-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607072" comment="php7-bz2-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607073" comment="php7-calendar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607074" comment="php7-ctype-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607075" comment="php7-curl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607076" comment="php7-dba-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607077" comment="php7-devel-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607078" comment="php7-dom-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607079" comment="php7-embed-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607080" comment="php7-enchant-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607081" comment="php7-exif-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607082" comment="php7-fastcgi-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607083" comment="php7-fileinfo-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607084" comment="php7-firebird-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607085" comment="php7-fpm-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607086" comment="php7-ftp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607087" comment="php7-gd-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607088" comment="php7-gettext-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607089" comment="php7-gmp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607090" comment="php7-iconv-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607091" comment="php7-intl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607092" comment="php7-json-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607093" comment="php7-ldap-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607094" comment="php7-mbstring-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607095" comment="php7-mysql-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607096" comment="php7-odbc-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607097" comment="php7-opcache-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607098" comment="php7-openssl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607099" comment="php7-pcntl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607100" comment="php7-pdo-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607101" comment="php7-pear-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607102" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607103" comment="php7-pgsql-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607104" comment="php7-phar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607105" comment="php7-posix-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607106" comment="php7-readline-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607107" comment="php7-shmop-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607108" comment="php7-snmp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607109" comment="php7-soap-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607110" comment="php7-sockets-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607111" comment="php7-sodium-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607112" comment="php7-sqlite-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607113" comment="php7-sysvmsg-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607114" comment="php7-sysvsem-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607115" comment="php7-sysvshm-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607116" comment="php7-test-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607117" comment="php7-tidy-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607118" comment="php7-tokenizer-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607119" comment="php7-wddx-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607120" comment="php7-xmlreader-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607121" comment="php7-xmlrpc-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607122" comment="php7-xmlwriter-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607123" comment="php7-xsl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607124" comment="php7-zip-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607125" comment="php7-zlib-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7063</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7063" ref_url="https://www.suse.com/security/cve/CVE-2020-7063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result in files having more lax permissions than intended when such archive is extracted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7063/">CVE-2020-7063</cve>
	<bugzilla href="https://bugzilla.suse.com/1165289">SUSE bug 1165289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607069" comment="apache2-mod_php7-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607070" comment="php7-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607071" comment="php7-bcmath-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607072" comment="php7-bz2-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607073" comment="php7-calendar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607074" comment="php7-ctype-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607075" comment="php7-curl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607076" comment="php7-dba-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607077" comment="php7-devel-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607078" comment="php7-dom-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607079" comment="php7-embed-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607080" comment="php7-enchant-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607081" comment="php7-exif-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607082" comment="php7-fastcgi-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607083" comment="php7-fileinfo-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607084" comment="php7-firebird-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607085" comment="php7-fpm-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607086" comment="php7-ftp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607087" comment="php7-gd-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607088" comment="php7-gettext-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607089" comment="php7-gmp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607090" comment="php7-iconv-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607091" comment="php7-intl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607092" comment="php7-json-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607093" comment="php7-ldap-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607094" comment="php7-mbstring-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607095" comment="php7-mysql-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607096" comment="php7-odbc-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607097" comment="php7-opcache-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607098" comment="php7-openssl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607099" comment="php7-pcntl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607100" comment="php7-pdo-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607101" comment="php7-pear-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607102" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607103" comment="php7-pgsql-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607104" comment="php7-phar-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607105" comment="php7-posix-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607106" comment="php7-readline-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607107" comment="php7-shmop-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607108" comment="php7-snmp-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607109" comment="php7-soap-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607110" comment="php7-sockets-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607111" comment="php7-sodium-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607112" comment="php7-sqlite-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607113" comment="php7-sysvmsg-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607114" comment="php7-sysvsem-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607115" comment="php7-sysvshm-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607116" comment="php7-test-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607117" comment="php7-tidy-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607118" comment="php7-tokenizer-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607119" comment="php7-wddx-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607120" comment="php7-xmlreader-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607121" comment="php7-xmlrpc-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607122" comment="php7-xmlwriter-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607123" comment="php7-xsl-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607124" comment="php7-zip-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607125" comment="php7-zlib-7.2.5-lp151.6.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7064</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7064" ref_url="https://www.suse.com/security/cve/CVE-2020-7064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7064/">CVE-2020-7064</cve>
	<bugzilla href="https://bugzilla.suse.com/1168326">SUSE bug 1168326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607872" comment="apache2-mod_php7-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607873" comment="libtidy-devel-5.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283044" comment="libtidy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607874" comment="libtidy5-5.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283045" comment="libtidy5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607875" comment="php7-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607876" comment="php7-bcmath-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607877" comment="php7-bz2-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607878" comment="php7-calendar-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607879" comment="php7-ctype-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607880" comment="php7-curl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607881" comment="php7-dba-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607882" comment="php7-devel-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607883" comment="php7-dom-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607884" comment="php7-embed-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607885" comment="php7-enchant-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607886" comment="php7-exif-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607887" comment="php7-fastcgi-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607888" comment="php7-fileinfo-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607889" comment="php7-firebird-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607890" comment="php7-fpm-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607891" comment="php7-ftp-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607892" comment="php7-gd-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607893" comment="php7-gettext-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607894" comment="php7-gmp-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607895" comment="php7-iconv-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607896" comment="php7-intl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607897" comment="php7-json-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607898" comment="php7-ldap-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607899" comment="php7-mbstring-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607900" comment="php7-mysql-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607901" comment="php7-odbc-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607902" comment="php7-opcache-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607903" comment="php7-openssl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607904" comment="php7-pcntl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607905" comment="php7-pdo-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607906" comment="php7-pear-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607907" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607908" comment="php7-pgsql-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607909" comment="php7-phar-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607910" comment="php7-posix-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607911" comment="php7-readline-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607912" comment="php7-shmop-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607913" comment="php7-snmp-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607914" comment="php7-soap-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607915" comment="php7-sockets-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607916" comment="php7-sodium-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607917" comment="php7-sqlite-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607918" comment="php7-sysvmsg-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607919" comment="php7-sysvsem-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607920" comment="php7-sysvshm-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607921" comment="php7-test-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607922" comment="php7-tidy-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607923" comment="php7-tokenizer-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607924" comment="php7-wddx-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607925" comment="php7-xmlreader-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607926" comment="php7-xmlrpc-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607927" comment="php7-xmlwriter-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607928" comment="php7-xsl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607929" comment="php7-zip-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607930" comment="php7-zlib-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607931" comment="tidy-5.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153017" comment="tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607932" comment="tidy-doc-5.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283046" comment="tidy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7066</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7066" ref_url="https://www.suse.com/security/cve/CVE-2020-7066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7066/">CVE-2020-7066</cve>
	<bugzilla href="https://bugzilla.suse.com/1168352">SUSE bug 1168352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607872" comment="apache2-mod_php7-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607873" comment="libtidy-devel-5.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283044" comment="libtidy-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607874" comment="libtidy5-5.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283045" comment="libtidy5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607875" comment="php7-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607876" comment="php7-bcmath-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607877" comment="php7-bz2-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607878" comment="php7-calendar-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607879" comment="php7-ctype-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607880" comment="php7-curl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607881" comment="php7-dba-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607882" comment="php7-devel-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607883" comment="php7-dom-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607884" comment="php7-embed-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607885" comment="php7-enchant-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607886" comment="php7-exif-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607887" comment="php7-fastcgi-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607888" comment="php7-fileinfo-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607889" comment="php7-firebird-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607890" comment="php7-fpm-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607891" comment="php7-ftp-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607892" comment="php7-gd-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607893" comment="php7-gettext-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607894" comment="php7-gmp-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607895" comment="php7-iconv-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607896" comment="php7-intl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607897" comment="php7-json-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607898" comment="php7-ldap-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607899" comment="php7-mbstring-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607900" comment="php7-mysql-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607901" comment="php7-odbc-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607902" comment="php7-opcache-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607903" comment="php7-openssl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607904" comment="php7-pcntl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607905" comment="php7-pdo-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607906" comment="php7-pear-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607907" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607908" comment="php7-pgsql-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607909" comment="php7-phar-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607910" comment="php7-posix-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607911" comment="php7-readline-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607912" comment="php7-shmop-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607913" comment="php7-snmp-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607914" comment="php7-soap-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607915" comment="php7-sockets-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607916" comment="php7-sodium-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607917" comment="php7-sqlite-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607918" comment="php7-sysvmsg-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607919" comment="php7-sysvsem-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607920" comment="php7-sysvshm-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607921" comment="php7-test-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607922" comment="php7-tidy-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607923" comment="php7-tokenizer-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607924" comment="php7-wddx-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607925" comment="php7-xmlreader-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607926" comment="php7-xmlrpc-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607927" comment="php7-xmlwriter-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607928" comment="php7-xsl-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607929" comment="php7-zip-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607930" comment="php7-zlib-7.2.5-lp151.6.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607931" comment="tidy-5.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153017" comment="tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607932" comment="tidy-doc-5.4.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009283046" comment="tidy-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7068</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00016.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068</cve>
	<bugzilla href="https://bugzilla.suse.com/1175203">SUSE bug 1175203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175223">SUSE bug 1175223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605086" comment="apache2-mod_php7-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605087" comment="php7-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605088" comment="php7-bcmath-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605089" comment="php7-bz2-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605090" comment="php7-calendar-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605091" comment="php7-ctype-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605092" comment="php7-curl-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605093" comment="php7-dba-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605094" comment="php7-devel-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605095" comment="php7-dom-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605096" comment="php7-embed-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605097" comment="php7-enchant-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605098" comment="php7-exif-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605099" comment="php7-fastcgi-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605100" comment="php7-fileinfo-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605101" comment="php7-firebird-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605102" comment="php7-fpm-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605103" comment="php7-ftp-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605104" comment="php7-gd-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605105" comment="php7-gettext-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605106" comment="php7-gmp-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605107" comment="php7-iconv-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605108" comment="php7-intl-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605109" comment="php7-json-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605110" comment="php7-ldap-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605111" comment="php7-mbstring-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605112" comment="php7-mysql-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605113" comment="php7-odbc-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605114" comment="php7-opcache-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605115" comment="php7-openssl-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605116" comment="php7-pcntl-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605117" comment="php7-pdo-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605118" comment="php7-pear-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605119" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605120" comment="php7-pgsql-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605121" comment="php7-phar-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605122" comment="php7-posix-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605123" comment="php7-readline-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605124" comment="php7-shmop-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605125" comment="php7-snmp-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605126" comment="php7-soap-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605127" comment="php7-sockets-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605128" comment="php7-sodium-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605129" comment="php7-sqlite-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605130" comment="php7-sysvmsg-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605131" comment="php7-sysvsem-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605132" comment="php7-sysvshm-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605133" comment="php7-test-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605134" comment="php7-tidy-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605135" comment="php7-tokenizer-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605136" comment="php7-wddx-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605137" comment="php7-xmlreader-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605138" comment="php7-xmlrpc-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605139" comment="php7-xmlwriter-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605140" comment="php7-xsl-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605141" comment="php7-zip-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605142" comment="php7-zlib-7.2.5-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7069</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7069" ref_url="https://www.suse.com/security/cve/CVE-2020-7069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007610.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7069/">CVE-2020-7069</cve>
	<bugzilla href="https://bugzilla.suse.com/1177351">SUSE bug 1177351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605746" comment="apache2-mod_php7-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605747" comment="php7-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605748" comment="php7-bcmath-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605749" comment="php7-bz2-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605750" comment="php7-calendar-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605751" comment="php7-ctype-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605752" comment="php7-curl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605753" comment="php7-dba-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605754" comment="php7-devel-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605755" comment="php7-dom-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605756" comment="php7-embed-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605757" comment="php7-enchant-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605758" comment="php7-exif-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605759" comment="php7-fastcgi-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605760" comment="php7-fileinfo-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605761" comment="php7-firebird-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605762" comment="php7-fpm-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605763" comment="php7-ftp-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605764" comment="php7-gd-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605765" comment="php7-gettext-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605766" comment="php7-gmp-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605767" comment="php7-iconv-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605768" comment="php7-intl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605769" comment="php7-json-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605770" comment="php7-ldap-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605771" comment="php7-mbstring-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605772" comment="php7-mysql-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605773" comment="php7-odbc-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605774" comment="php7-opcache-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605775" comment="php7-openssl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605776" comment="php7-pcntl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605777" comment="php7-pdo-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605778" comment="php7-pear-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605779" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605780" comment="php7-pgsql-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605781" comment="php7-phar-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605782" comment="php7-posix-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605783" comment="php7-readline-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605784" comment="php7-shmop-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605785" comment="php7-snmp-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605786" comment="php7-soap-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605787" comment="php7-sockets-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605788" comment="php7-sodium-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605789" comment="php7-sqlite-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605790" comment="php7-sysvmsg-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605791" comment="php7-sysvsem-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605792" comment="php7-sysvshm-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605793" comment="php7-test-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605794" comment="php7-tidy-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605795" comment="php7-tokenizer-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605796" comment="php7-wddx-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605797" comment="php7-xmlreader-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605798" comment="php7-xmlrpc-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605799" comment="php7-xmlwriter-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605800" comment="php7-xsl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605801" comment="php7-zip-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605802" comment="php7-zlib-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7070</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007610.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605746" comment="apache2-mod_php7-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605747" comment="php7-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605748" comment="php7-bcmath-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605749" comment="php7-bz2-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605750" comment="php7-calendar-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605751" comment="php7-ctype-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605752" comment="php7-curl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605753" comment="php7-dba-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605754" comment="php7-devel-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605755" comment="php7-dom-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605756" comment="php7-embed-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605757" comment="php7-enchant-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605758" comment="php7-exif-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605759" comment="php7-fastcgi-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605760" comment="php7-fileinfo-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605761" comment="php7-firebird-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605762" comment="php7-fpm-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605763" comment="php7-ftp-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605764" comment="php7-gd-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605765" comment="php7-gettext-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605766" comment="php7-gmp-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605767" comment="php7-iconv-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605768" comment="php7-intl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605769" comment="php7-json-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605770" comment="php7-ldap-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605771" comment="php7-mbstring-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605772" comment="php7-mysql-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605773" comment="php7-odbc-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605774" comment="php7-opcache-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605775" comment="php7-openssl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605776" comment="php7-pcntl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605777" comment="php7-pdo-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605778" comment="php7-pear-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605779" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605780" comment="php7-pgsql-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605781" comment="php7-phar-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605782" comment="php7-posix-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605783" comment="php7-readline-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605784" comment="php7-shmop-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605785" comment="php7-snmp-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605786" comment="php7-soap-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605787" comment="php7-sockets-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605788" comment="php7-sodium-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605789" comment="php7-sqlite-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605790" comment="php7-sysvmsg-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605791" comment="php7-sysvsem-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605792" comment="php7-sysvshm-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605793" comment="php7-test-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605794" comment="php7-tidy-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605795" comment="php7-tokenizer-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605796" comment="php7-wddx-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605797" comment="php7-xmlreader-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605798" comment="php7-xmlrpc-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605799" comment="php7-xmlwriter-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605800" comment="php7-xsl-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605801" comment="php7-zip-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605802" comment="php7-zlib-7.2.5-lp151.6.36.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7071</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008205.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZK6WI45JWQQCL3UANARH52Z3ZFW35EEN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVZV746EP7YN4PYD2GLL5MXDCB5X5DPB/" source="SUSE-SU"/>
    <description>
    In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071</cve>
	<bugzilla href="https://bugzilla.suse.com/1180706">SUSE bug 1180706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609356" comment="apache2-mod_php7-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154143" comment="apache2-mod_php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609357" comment="php7-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154144" comment="php7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609358" comment="php7-bcmath-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154145" comment="php7-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609359" comment="php7-bz2-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154146" comment="php7-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609360" comment="php7-calendar-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154147" comment="php7-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609361" comment="php7-ctype-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154148" comment="php7-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609362" comment="php7-curl-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154149" comment="php7-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609363" comment="php7-dba-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154150" comment="php7-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609364" comment="php7-devel-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154151" comment="php7-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609365" comment="php7-dom-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154152" comment="php7-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609366" comment="php7-embed-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230509" comment="php7-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609367" comment="php7-enchant-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154153" comment="php7-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609368" comment="php7-exif-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154154" comment="php7-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609369" comment="php7-fastcgi-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154155" comment="php7-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609370" comment="php7-fileinfo-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154156" comment="php7-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609371" comment="php7-firebird-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154157" comment="php7-firebird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609372" comment="php7-fpm-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154158" comment="php7-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609373" comment="php7-ftp-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154159" comment="php7-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609374" comment="php7-gd-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154160" comment="php7-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609375" comment="php7-gettext-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154161" comment="php7-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609376" comment="php7-gmp-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154162" comment="php7-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609377" comment="php7-iconv-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154163" comment="php7-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609378" comment="php7-intl-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154165" comment="php7-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609379" comment="php7-json-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154166" comment="php7-json is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609380" comment="php7-ldap-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154167" comment="php7-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609381" comment="php7-mbstring-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154168" comment="php7-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609382" comment="php7-mysql-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154170" comment="php7-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609383" comment="php7-odbc-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154171" comment="php7-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609384" comment="php7-opcache-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154172" comment="php7-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609385" comment="php7-openssl-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154173" comment="php7-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609386" comment="php7-pcntl-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154174" comment="php7-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609387" comment="php7-pdo-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154175" comment="php7-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609388" comment="php7-pear-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154176" comment="php7-pear is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609389" comment="php7-pear-Archive_Tar-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154177" comment="php7-pear-Archive_Tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609390" comment="php7-pgsql-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154178" comment="php7-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609391" comment="php7-phar-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154179" comment="php7-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609392" comment="php7-posix-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154180" comment="php7-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609393" comment="php7-readline-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154182" comment="php7-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609394" comment="php7-shmop-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154183" comment="php7-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609395" comment="php7-snmp-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154184" comment="php7-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609396" comment="php7-soap-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154185" comment="php7-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609397" comment="php7-sockets-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154186" comment="php7-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609398" comment="php7-sodium-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230510" comment="php7-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609399" comment="php7-sqlite-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154187" comment="php7-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609400" comment="php7-sysvmsg-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154188" comment="php7-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609401" comment="php7-sysvsem-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154189" comment="php7-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609402" comment="php7-sysvshm-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154190" comment="php7-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609403" comment="php7-test-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009270016" comment="php7-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609404" comment="php7-tidy-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154191" comment="php7-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609405" comment="php7-tokenizer-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154192" comment="php7-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609406" comment="php7-wddx-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154193" comment="php7-wddx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609407" comment="php7-xmlreader-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154194" comment="php7-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609408" comment="php7-xmlrpc-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154195" comment="php7-xmlrpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609409" comment="php7-xmlwriter-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154196" comment="php7-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609410" comment="php7-xsl-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154197" comment="php7-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609411" comment="php7-zip-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154198" comment="php7-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609412" comment="php7-zlib-7.2.5-lp151.6.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154199" comment="php7-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7106</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7106" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7106" ref_url="https://www.suse.com/security/cve/CVE-2020-7106" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0654-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00032.html" source="SUSE-SU"/>
    <description>
    Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7106/">CVE-2020-7106</cve>
	<bugzilla href="https://bugzilla.suse.com/1163749">SUSE bug 1163749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609957" comment="cacti-1.2.12-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609958" comment="cacti-spine-1.2.12-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7216</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7216" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7216" ref_url="https://www.suse.com/security/cve/CVE-2020-7216" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00005.html" source="SUSE-SU"/>
    <description>
    An ni_dhcp4_parse_response memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets without a message type option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7216/">CVE-2020-7216</cve>
	<bugzilla href="https://bugzilla.suse.com/1160905">SUSE bug 1160905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605508" comment="wicked-0.6.60-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277410" comment="wicked is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605509" comment="wicked-service-0.6.60-lp151.2.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277411" comment="wicked-service is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7217</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7217" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7217" ref_url="https://www.suse.com/security/cve/CVE-2020-7217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00011.html" source="SUSE-SU"/>
    <description>
    An ni_dhcp4_fsm_process_dhcp4_packet memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets with a different client-id.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7217/">CVE-2020-7217</cve>
	<bugzilla href="https://bugzilla.suse.com/1160906">SUSE bug 1160906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606390" comment="wicked-0.6.60-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277410" comment="wicked is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606391" comment="wicked-service-0.6.60-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009277411" comment="wicked-service is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7237</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7237" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7237" ref_url="https://www.suse.com/security/cve/CVE-2020-7237" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-7237/">CVE-2020-7237</cve>
	<bugzilla href="https://bugzilla.suse.com/1161297">SUSE bug 1161297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7595</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0681-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-05/msg00124.html" source="SUSE-SU"/>
    <description>
    xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595</cve>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608033" comment="libxml2-2-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608034" comment="libxml2-2-32bit-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151138" comment="libxml2-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608035" comment="libxml2-devel-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608036" comment="libxml2-devel-32bit-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152663" comment="libxml2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608037" comment="libxml2-doc-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608038" comment="libxml2-tools-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608039" comment="python2-libxml2-python-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237173" comment="python2-libxml2-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608040" comment="python3-libxml2-python-2.9.7-lp151.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177126" comment="python3-libxml2-python is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7598</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7598" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7598" ref_url="https://www.suse.com/security/cve/CVE-2020-7598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" source="SUSE-SU"/>
    <description>
    minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7598/">CVE-2020-7598</cve>
	<bugzilla href="https://bugzilla.suse.com/1166916">SUSE bug 1166916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608569" comment="nodejs8-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608570" comment="nodejs8-devel-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608571" comment="nodejs8-docs-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608572" comment="npm8-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8013</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8013" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:81-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:82-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607012" comment="permissions-20181116-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273426" comment="permissions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607013" comment="permissions-zypp-plugin-20181116-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273427" comment="permissions-zypp-plugin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8015</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8015" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8015" ref_url="https://www.suse.com/security/cve/CVE-2020-8015" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMX36VOLIS2TDKA3MXOUO365NDUK5WQ3/" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8015/">CVE-2020-8015</cve>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154183">SUSE bug 1154183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607427" comment="exim-4.88-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607428" comment="eximon-4.88-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607429" comment="eximstats-html-4.88-lp151.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8016</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8016" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8016" ref_url="https://www.suse.com/security/cve/CVE-2020-8016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1580-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00021.html" source="SUSE-SU"/>
    <description>
    A Race Condition Enabling Link Following vulnerability in the packaging of texlive-filesystem of SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local users to corrupt files or potentially escalate privileges. This issue affects: SUSE Linux Enterprise Module for Desktop Applications 15-SP1 texlive-filesystem versions prior to 2017.135-9.5.1. SUSE Linux Enterprise Software Development Kit 12-SP4 texlive-filesystem versions prior to 2013.74-16.5.1. SUSE Linux Enterprise Software Development Kit 12-SP5 texlive-filesystem versions prior to 2013.74-16.5.1. openSUSE Leap 15.1 texlive-filesystem versions prior to 2017.135-lp151.8.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8016/">CVE-2020-8016</cve>
	<bugzilla href="https://bugzilla.suse.com/1158910">SUSE bug 1158910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159740">SUSE bug 1159740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608575" comment="libkpathsea6-6.2.3-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161289" comment="libkpathsea6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608576" comment="libptexenc1-1.3.5-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236059" comment="libptexenc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608577" comment="libsynctex1-1.18-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236060" comment="libsynctex1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608578" comment="libtexlua52-5-5.2.4-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236061" comment="libtexlua52-5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608579" comment="libtexluajit2-2.1.0beta2-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236062" comment="libtexluajit2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608580" comment="perl-biber-2017.20170520.svn30357-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236063" comment="perl-biber is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608581" comment="texlive-2017.20170520-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236064" comment="texlive is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608582" comment="texlive-a2ping-bin-2017.20170520.svn27321-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236065" comment="texlive-a2ping-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608583" comment="texlive-accfonts-bin-2017.20170520.svn12688-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236066" comment="texlive-accfonts-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608584" comment="texlive-adhocfilelist-bin-2017.20170520.svn28038-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236067" comment="texlive-adhocfilelist-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608585" comment="texlive-afm2pl-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236068" comment="texlive-afm2pl-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608586" comment="texlive-aleph-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236069" comment="texlive-aleph-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608587" comment="texlive-amstex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236070" comment="texlive-amstex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608588" comment="texlive-arara-bin-2017.20170520.svn29036-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236071" comment="texlive-arara-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608589" comment="texlive-asymptote-bin-2017.20170520.svn43843-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236072" comment="texlive-asymptote-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608590" comment="texlive-authorindex-bin-2017.20170520.svn18790-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236073" comment="texlive-authorindex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608591" comment="texlive-autosp-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236074" comment="texlive-autosp-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608592" comment="texlive-biber-bin-2017.20170520.svn42679-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236075" comment="texlive-biber-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608593" comment="texlive-bibexport-bin-2017.20170520.svn16219-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236076" comment="texlive-bibexport-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608594" comment="texlive-bibtex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236077" comment="texlive-bibtex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608595" comment="texlive-bibtex8-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236078" comment="texlive-bibtex8-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608596" comment="texlive-bibtexu-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236079" comment="texlive-bibtexu-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608597" comment="texlive-bin-devel-2017.20170520-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236080" comment="texlive-bin-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608598" comment="texlive-bundledoc-bin-2017.20170520.svn17794-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236081" comment="texlive-bundledoc-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608599" comment="texlive-cachepic-bin-2017.20170520.svn15543-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236082" comment="texlive-cachepic-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608600" comment="texlive-checkcites-bin-2017.20170520.svn25623-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236083" comment="texlive-checkcites-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608601" comment="texlive-checklistings-bin-2017.20170520.svn38300-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236084" comment="texlive-checklistings-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608602" comment="texlive-chktex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236085" comment="texlive-chktex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608603" comment="texlive-cjk-gs-integrate-bin-2017.20170520.svn37223-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236086" comment="texlive-cjk-gs-integrate-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608604" comment="texlive-cjkutils-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236087" comment="texlive-cjkutils-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608605" comment="texlive-collection-basic-2017.135.svn41616-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285689" comment="texlive-collection-basic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608606" comment="texlive-collection-bibtexextra-2017.135.svn44385-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285690" comment="texlive-collection-bibtexextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608607" comment="texlive-collection-binextra-2017.135.svn44515-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285691" comment="texlive-collection-binextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608608" comment="texlive-collection-context-2017.135.svn42330-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285692" comment="texlive-collection-context is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608609" comment="texlive-collection-fontsextra-2017.135.svn43356-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285693" comment="texlive-collection-fontsextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608610" comment="texlive-collection-fontsrecommended-2017.135.svn35830-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285694" comment="texlive-collection-fontsrecommended is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608611" comment="texlive-collection-fontutils-2017.135.svn37105-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285695" comment="texlive-collection-fontutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608612" comment="texlive-collection-formatsextra-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285696" comment="texlive-collection-formatsextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608613" comment="texlive-collection-games-2017.135.svn42992-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285697" comment="texlive-collection-games is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608614" comment="texlive-collection-humanities-2017.135.svn42268-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285698" comment="texlive-collection-humanities is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608615" comment="texlive-collection-langarabic-2017.135.svn44496-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285699" comment="texlive-collection-langarabic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608616" comment="texlive-collection-langchinese-2017.135.svn42675-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285700" comment="texlive-collection-langchinese is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608617" comment="texlive-collection-langcjk-2017.135.svn43009-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285701" comment="texlive-collection-langcjk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608618" comment="texlive-collection-langcyrillic-2017.135.svn44401-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285702" comment="texlive-collection-langcyrillic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608619" comment="texlive-collection-langczechslovak-2017.135.svn32550-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285703" comment="texlive-collection-langczechslovak is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608620" comment="texlive-collection-langenglish-2017.135.svn43650-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285704" comment="texlive-collection-langenglish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608621" comment="texlive-collection-langeuropean-2017.135.svn44414-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285705" comment="texlive-collection-langeuropean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608622" comment="texlive-collection-langfrench-2017.135.svn40375-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285706" comment="texlive-collection-langfrench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608623" comment="texlive-collection-langgerman-2017.135.svn42045-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285707" comment="texlive-collection-langgerman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608624" comment="texlive-collection-langgreek-2017.135.svn44192-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285708" comment="texlive-collection-langgreek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608625" comment="texlive-collection-langitalian-2017.135.svn30372-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285709" comment="texlive-collection-langitalian is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608626" comment="texlive-collection-langjapanese-2017.135.svn44554-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285710" comment="texlive-collection-langjapanese is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608627" comment="texlive-collection-langkorean-2017.135.svn42106-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285711" comment="texlive-collection-langkorean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608628" comment="texlive-collection-langother-2017.135.svn44414-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285712" comment="texlive-collection-langother is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608629" comment="texlive-collection-langpolish-2017.135.svn44371-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285713" comment="texlive-collection-langpolish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608630" comment="texlive-collection-langportuguese-2017.135.svn30962-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285714" comment="texlive-collection-langportuguese is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608631" comment="texlive-collection-langspanish-2017.135.svn40587-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285715" comment="texlive-collection-langspanish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608632" comment="texlive-collection-latex-2017.135.svn41614-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285716" comment="texlive-collection-latex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608633" comment="texlive-collection-latexextra-2017.135.svn44544-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285717" comment="texlive-collection-latexextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608634" comment="texlive-collection-latexrecommended-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285718" comment="texlive-collection-latexrecommended is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608635" comment="texlive-collection-luatex-2017.135.svn44500-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285719" comment="texlive-collection-luatex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608636" comment="texlive-collection-mathscience-2017.135.svn44396-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285720" comment="texlive-collection-mathscience is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608637" comment="texlive-collection-metapost-2017.135.svn44297-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285721" comment="texlive-collection-metapost is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608638" comment="texlive-collection-music-2017.135.svn40561-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285722" comment="texlive-collection-music is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608639" comment="texlive-collection-pictures-2017.135.svn44395-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285723" comment="texlive-collection-pictures is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608640" comment="texlive-collection-plaingeneric-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285724" comment="texlive-collection-plaingeneric is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608641" comment="texlive-collection-pstricks-2017.135.svn44460-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285725" comment="texlive-collection-pstricks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608642" comment="texlive-collection-publishers-2017.135.svn44485-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285726" comment="texlive-collection-publishers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608643" comment="texlive-collection-xetex-2017.135.svn43059-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285727" comment="texlive-collection-xetex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608644" comment="texlive-context-bin-2017.20170520.svn34112-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236088" comment="texlive-context-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608645" comment="texlive-convbkmk-bin-2017.20170520.svn30408-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236089" comment="texlive-convbkmk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608646" comment="texlive-crossrefware-bin-2017.20170520.svn43866-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236090" comment="texlive-crossrefware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608647" comment="texlive-cslatex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236091" comment="texlive-cslatex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608648" comment="texlive-csplain-bin-2017.20170520.svn33902-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236092" comment="texlive-csplain-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608649" comment="texlive-ctanify-bin-2017.20170520.svn24061-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236093" comment="texlive-ctanify-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608650" comment="texlive-ctanupload-bin-2017.20170520.svn23866-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236094" comment="texlive-ctanupload-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608651" comment="texlive-ctie-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236095" comment="texlive-ctie-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608652" comment="texlive-cweb-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236096" comment="texlive-cweb-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608653" comment="texlive-cyrillic-bin-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236097" comment="texlive-cyrillic-bin-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608654" comment="texlive-de-macro-bin-2017.20170520.svn17399-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236098" comment="texlive-de-macro-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608655" comment="texlive-detex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236099" comment="texlive-detex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608656" comment="texlive-devel-2017.135-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285728" comment="texlive-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608657" comment="texlive-diadia-bin-2017.20170520.svn37645-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236101" comment="texlive-diadia-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608658" comment="texlive-dosepsbin-bin-2017.20170520.svn24759-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236102" comment="texlive-dosepsbin-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608659" comment="texlive-dtl-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236103" comment="texlive-dtl-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608660" comment="texlive-dtxgen-bin-2017.20170520.svn29031-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236104" comment="texlive-dtxgen-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608661" comment="texlive-dviasm-bin-2017.20170520.svn8329-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236105" comment="texlive-dviasm-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608662" comment="texlive-dvicopy-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236106" comment="texlive-dvicopy-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608663" comment="texlive-dvidvi-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236107" comment="texlive-dvidvi-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608664" comment="texlive-dviinfox-bin-2017.20170520.svn44515-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237840" comment="texlive-dviinfox-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608665" comment="texlive-dviljk-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236108" comment="texlive-dviljk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608666" comment="texlive-dvipdfmx-bin-2017.20170520.svn40273-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236109" comment="texlive-dvipdfmx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608667" comment="texlive-dvipng-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236110" comment="texlive-dvipng-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608668" comment="texlive-dvipos-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236111" comment="texlive-dvipos-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608669" comment="texlive-dvips-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236112" comment="texlive-dvips-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608670" comment="texlive-dvisvgm-bin-2017.20170520.svn40987-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236113" comment="texlive-dvisvgm-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608671" comment="texlive-ebong-bin-2017.20170520.svn21000-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236114" comment="texlive-ebong-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608672" comment="texlive-eplain-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236115" comment="texlive-eplain-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608673" comment="texlive-epspdf-bin-2017.20170520.svn29050-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236116" comment="texlive-epspdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608674" comment="texlive-epstopdf-bin-2017.20170520.svn18336-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236117" comment="texlive-epstopdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608675" comment="texlive-exceltex-bin-2017.20170520.svn25860-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236118" comment="texlive-exceltex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608676" comment="texlive-extratools-2017.135-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285729" comment="texlive-extratools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608677" comment="texlive-fig4latex-bin-2017.20170520.svn14752-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236119" comment="texlive-fig4latex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608678" comment="texlive-filesystem-2017.135-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285730" comment="texlive-filesystem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608679" comment="texlive-findhyph-bin-2017.20170520.svn14758-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236120" comment="texlive-findhyph-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608680" comment="texlive-fontinst-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236121" comment="texlive-fontinst-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608681" comment="texlive-fontools-bin-2017.20170520.svn25997-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236122" comment="texlive-fontools-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608682" comment="texlive-fontware-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236123" comment="texlive-fontware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608683" comment="texlive-fragmaster-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236124" comment="texlive-fragmaster-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608684" comment="texlive-getmap-bin-2017.20170520.svn34971-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236125" comment="texlive-getmap-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608685" comment="texlive-glossaries-bin-2017.20170520.svn37813-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236126" comment="texlive-glossaries-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608686" comment="texlive-gregoriotex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236127" comment="texlive-gregoriotex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608687" comment="texlive-gsftopk-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236128" comment="texlive-gsftopk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608688" comment="texlive-jadetex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236129" comment="texlive-jadetex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608689" comment="texlive-kotex-utils-bin-2017.20170520.svn32101-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236131" comment="texlive-kotex-utils-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608690" comment="texlive-kpathsea-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236132" comment="texlive-kpathsea-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608691" comment="texlive-kpathsea-devel-6.2.3-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236133" comment="texlive-kpathsea-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608692" comment="texlive-lacheck-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236134" comment="texlive-lacheck-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608693" comment="texlive-latex-bin-bin-2017.20170520.svn14050-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236135" comment="texlive-latex-bin-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608694" comment="texlive-latex-git-log-bin-2017.20170520.svn30983-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236136" comment="texlive-latex-git-log-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608695" comment="texlive-latex-papersize-bin-2017.20170520.svn42296-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237841" comment="texlive-latex-papersize-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608696" comment="texlive-latex2man-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236137" comment="texlive-latex2man-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608697" comment="texlive-latex2nemeth-bin-2017.20170520.svn42300-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237842" comment="texlive-latex2nemeth-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608698" comment="texlive-latexdiff-bin-2017.20170520.svn16420-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236138" comment="texlive-latexdiff-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608699" comment="texlive-latexfileversion-bin-2017.20170520.svn25012-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236139" comment="texlive-latexfileversion-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608700" comment="texlive-latexindent-bin-2017.20170520.svn32150-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236140" comment="texlive-latexindent-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608701" comment="texlive-latexmk-bin-2017.20170520.svn10937-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236141" comment="texlive-latexmk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608702" comment="texlive-latexpand-bin-2017.20170520.svn27025-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236142" comment="texlive-latexpand-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608703" comment="texlive-lcdftypetools-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236143" comment="texlive-lcdftypetools-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608704" comment="texlive-lilyglyphs-bin-2017.20170520.svn31696-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236144" comment="texlive-lilyglyphs-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608705" comment="texlive-listbib-bin-2017.20170520.svn26126-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236145" comment="texlive-listbib-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608706" comment="texlive-listings-ext-bin-2017.20170520.svn15093-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236146" comment="texlive-listings-ext-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608707" comment="texlive-lollipop-bin-2017.20170520.svn41465-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236147" comment="texlive-lollipop-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608708" comment="texlive-ltxfileinfo-bin-2017.20170520.svn29005-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236148" comment="texlive-ltxfileinfo-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608709" comment="texlive-ltximg-bin-2017.20170520.svn32346-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236149" comment="texlive-ltximg-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608710" comment="texlive-lua2dox-bin-2017.20170520.svn29053-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236150" comment="texlive-lua2dox-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608711" comment="texlive-luaotfload-bin-2017.20170520.svn34647-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236151" comment="texlive-luaotfload-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608712" comment="texlive-luatex-bin-2017.20170520.svn44549-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236152" comment="texlive-luatex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608713" comment="texlive-lwarp-bin-2017.20170520.svn43292-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237843" comment="texlive-lwarp-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608714" comment="texlive-m-tx-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236153" comment="texlive-m-tx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608715" comment="texlive-make4ht-bin-2017.20170520.svn37750-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236154" comment="texlive-make4ht-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608716" comment="texlive-makedtx-bin-2017.20170520.svn38769-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236155" comment="texlive-makedtx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608717" comment="texlive-makeindex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236156" comment="texlive-makeindex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608718" comment="texlive-match_parens-bin-2017.20170520.svn23500-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236157" comment="texlive-match_parens-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608719" comment="texlive-mathspic-bin-2017.20170520.svn23661-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236158" comment="texlive-mathspic-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608720" comment="texlive-metafont-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236159" comment="texlive-metafont-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608721" comment="texlive-metapost-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236160" comment="texlive-metapost-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608722" comment="texlive-mex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236161" comment="texlive-mex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608723" comment="texlive-mf2pt1-bin-2017.20170520.svn23406-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236162" comment="texlive-mf2pt1-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608724" comment="texlive-mflua-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236163" comment="texlive-mflua-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608725" comment="texlive-mfware-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236164" comment="texlive-mfware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608726" comment="texlive-mkgrkindex-bin-2017.20170520.svn14428-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236165" comment="texlive-mkgrkindex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608727" comment="texlive-mkjobtexmf-bin-2017.20170520.svn8457-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236166" comment="texlive-mkjobtexmf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608728" comment="texlive-mkpic-bin-2017.20170520.svn33688-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236167" comment="texlive-mkpic-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608729" comment="texlive-mltex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236168" comment="texlive-mltex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608730" comment="texlive-mptopdf-bin-2017.20170520.svn18674-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236169" comment="texlive-mptopdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608731" comment="texlive-multibibliography-bin-2017.20170520.svn30534-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236170" comment="texlive-multibibliography-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608732" comment="texlive-musixtex-bin-2017.20170520.svn37026-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236171" comment="texlive-musixtex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608733" comment="texlive-musixtnt-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236172" comment="texlive-musixtnt-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608734" comment="texlive-omegaware-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236173" comment="texlive-omegaware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608735" comment="texlive-patgen-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236174" comment="texlive-patgen-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608736" comment="texlive-pax-bin-2017.20170520.svn10843-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236175" comment="texlive-pax-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608737" comment="texlive-pdfbook2-bin-2017.20170520.svn37537-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236176" comment="texlive-pdfbook2-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608738" comment="texlive-pdfcrop-bin-2017.20170520.svn14387-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236177" comment="texlive-pdfcrop-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608739" comment="texlive-pdfjam-bin-2017.20170520.svn17868-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236178" comment="texlive-pdfjam-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608740" comment="texlive-pdflatexpicscale-bin-2017.20170520.svn41779-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237844" comment="texlive-pdflatexpicscale-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608741" comment="texlive-pdftex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236179" comment="texlive-pdftex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608742" comment="texlive-pdftools-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236180" comment="texlive-pdftools-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608743" comment="texlive-pdfxup-bin-2017.20170520.svn40690-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236181" comment="texlive-pdfxup-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608744" comment="texlive-pedigree-perl-bin-2017.20170520.svn25962-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236182" comment="texlive-pedigree-perl-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608745" comment="texlive-perltex-bin-2017.20170520.svn16181-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236183" comment="texlive-perltex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608746" comment="texlive-petri-nets-bin-2017.20170520.svn39165-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236184" comment="texlive-petri-nets-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608747" comment="texlive-pfarrei-bin-2017.20170520.svn29348-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236185" comment="texlive-pfarrei-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608748" comment="texlive-pkfix-bin-2017.20170520.svn13364-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236186" comment="texlive-pkfix-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608749" comment="texlive-pkfix-helper-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236187" comment="texlive-pkfix-helper-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608750" comment="texlive-platex-bin-2017.20170520.svn22859-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236188" comment="texlive-platex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608751" comment="texlive-pmx-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236189" comment="texlive-pmx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608752" comment="texlive-pmxchords-bin-2017.20170520.svn32405-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236190" comment="texlive-pmxchords-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608753" comment="texlive-ps2pk-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236191" comment="texlive-ps2pk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608754" comment="texlive-pst-pdf-bin-2017.20170520.svn7838-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236192" comment="texlive-pst-pdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608755" comment="texlive-pst2pdf-bin-2017.20170520.svn29333-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236193" comment="texlive-pst2pdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608756" comment="texlive-pstools-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236194" comment="texlive-pstools-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608757" comment="texlive-ptex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236195" comment="texlive-ptex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608758" comment="texlive-ptex-fontmaps-bin-2017.20170520.svn44206-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237845" comment="texlive-ptex-fontmaps-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608759" comment="texlive-ptex2pdf-bin-2017.20170520.svn29335-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236196" comment="texlive-ptex2pdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608760" comment="texlive-ptexenc-devel-1.3.5-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236197" comment="texlive-ptexenc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608761" comment="texlive-purifyeps-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236198" comment="texlive-purifyeps-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608762" comment="texlive-pygmentex-bin-2017.20170520.svn34996-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236199" comment="texlive-pygmentex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608763" comment="texlive-pythontex-bin-2017.20170520.svn31638-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236200" comment="texlive-pythontex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608764" comment="texlive-rubik-bin-2017.20170520.svn32919-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236201" comment="texlive-rubik-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608765" comment="texlive-scheme-basic-2017.135.svn25923-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285731" comment="texlive-scheme-basic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608766" comment="texlive-scheme-context-2017.135.svn35799-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285732" comment="texlive-scheme-context is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608767" comment="texlive-scheme-full-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285733" comment="texlive-scheme-full is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608768" comment="texlive-scheme-gust-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285734" comment="texlive-scheme-gust is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608769" comment="texlive-scheme-infraonly-2017.135.svn41515-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285735" comment="texlive-scheme-infraonly is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608770" comment="texlive-scheme-medium-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285736" comment="texlive-scheme-medium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608771" comment="texlive-scheme-minimal-2017.135.svn13822-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285737" comment="texlive-scheme-minimal is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608772" comment="texlive-scheme-small-2017.135.svn41825-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285738" comment="texlive-scheme-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608773" comment="texlive-scheme-tetex-2017.135.svn44187-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285739" comment="texlive-scheme-tetex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608774" comment="texlive-seetexk-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236202" comment="texlive-seetexk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608775" comment="texlive-splitindex-bin-2017.20170520.svn29688-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236203" comment="texlive-splitindex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608776" comment="texlive-srcredact-bin-2017.20170520.svn38710-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236204" comment="texlive-srcredact-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608777" comment="texlive-sty2dtx-bin-2017.20170520.svn21215-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236205" comment="texlive-sty2dtx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608778" comment="texlive-svn-multi-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236206" comment="texlive-svn-multi-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608779" comment="texlive-synctex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236207" comment="texlive-synctex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608780" comment="texlive-synctex-devel-1.18-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236208" comment="texlive-synctex-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608781" comment="texlive-tetex-bin-2017.20170520.svn43957-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236209" comment="texlive-tetex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608782" comment="texlive-tex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236210" comment="texlive-tex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608783" comment="texlive-tex4ebook-bin-2017.20170520.svn37771-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236211" comment="texlive-tex4ebook-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608784" comment="texlive-tex4ht-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236212" comment="texlive-tex4ht-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608785" comment="texlive-texconfig-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236213" comment="texlive-texconfig-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608786" comment="texlive-texcount-bin-2017.20170520.svn13013-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236214" comment="texlive-texcount-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608787" comment="texlive-texdef-bin-2017.20170520.svn21802-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236215" comment="texlive-texdef-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608788" comment="texlive-texdiff-bin-2017.20170520.svn15506-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236216" comment="texlive-texdiff-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608789" comment="texlive-texdirflatten-bin-2017.20170520.svn12782-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236217" comment="texlive-texdirflatten-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608790" comment="texlive-texdoc-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236218" comment="texlive-texdoc-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608791" comment="texlive-texfot-bin-2017.20170520.svn33155-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236219" comment="texlive-texfot-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608792" comment="texlive-texliveonfly-bin-2017.20170520.svn24062-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236220" comment="texlive-texliveonfly-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608793" comment="texlive-texloganalyser-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236221" comment="texlive-texloganalyser-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608794" comment="texlive-texlua-devel-5.2.4-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236222" comment="texlive-texlua-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608795" comment="texlive-texluajit-devel-2.1.0beta2-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236223" comment="texlive-texluajit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608796" comment="texlive-texosquery-bin-2017.20170520.svn43596-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237846" comment="texlive-texosquery-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608797" comment="texlive-texsis-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236224" comment="texlive-texsis-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608798" comment="texlive-texware-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236225" comment="texlive-texware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608799" comment="texlive-thumbpdf-bin-2017.20170520.svn6898-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236226" comment="texlive-thumbpdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608800" comment="texlive-tie-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236227" comment="texlive-tie-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608801" comment="texlive-tpic2pdftex-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236228" comment="texlive-tpic2pdftex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608802" comment="texlive-ttfutils-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236229" comment="texlive-ttfutils-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608803" comment="texlive-typeoutfileinfo-bin-2017.20170520.svn25648-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236230" comment="texlive-typeoutfileinfo-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608804" comment="texlive-ulqda-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236231" comment="texlive-ulqda-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608805" comment="texlive-uplatex-bin-2017.20170520.svn26326-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236232" comment="texlive-uplatex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608806" comment="texlive-uptex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236233" comment="texlive-uptex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608807" comment="texlive-urlbst-bin-2017.20170520.svn23262-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236234" comment="texlive-urlbst-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608808" comment="texlive-velthuis-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237847" comment="texlive-velthuis-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608809" comment="texlive-vlna-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236235" comment="texlive-vlna-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608810" comment="texlive-vpe-bin-2017.20170520.svn6897-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236236" comment="texlive-vpe-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608811" comment="texlive-web-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236237" comment="texlive-web-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608812" comment="texlive-xdvi-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236238" comment="texlive-xdvi-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608813" comment="texlive-xetex-bin-2017.20170520.svn44361-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236239" comment="texlive-xetex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608814" comment="texlive-xmltex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236240" comment="texlive-xmltex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608815" comment="texlive-yplan-bin-2017.20170520.svn34398-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236241" comment="texlive-yplan-bin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8017</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8017" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8017" ref_url="https://www.suse.com/security/cve/CVE-2020-8017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1580-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00021.html" source="SUSE-SU"/>
    <description>
    A Race Condition Enabling Link Following vulnerability in the cron job shipped with texlive-filesystem of SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local users in group mktex to delete arbitrary files on the system This issue affects: SUSE Linux Enterprise Module for Desktop Applications 15-SP1 texlive-filesystem versions prior to 2017.135-9.5.1. SUSE Linux Enterprise Software Development Kit 12-SP4 texlive-filesystem versions prior to 2013.74-16.5.1. SUSE Linux Enterprise Software Development Kit 12-SP5 texlive-filesystem versions prior to 2013.74-16.5.1. openSUSE Leap 15.1 texlive-filesystem versions prior to 2017.135-lp151.8.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8017/">CVE-2020-8017</cve>
	<bugzilla href="https://bugzilla.suse.com/1158910">SUSE bug 1158910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159103">SUSE bug 1159103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608575" comment="libkpathsea6-6.2.3-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161289" comment="libkpathsea6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608576" comment="libptexenc1-1.3.5-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236059" comment="libptexenc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608577" comment="libsynctex1-1.18-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236060" comment="libsynctex1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608578" comment="libtexlua52-5-5.2.4-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236061" comment="libtexlua52-5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608579" comment="libtexluajit2-2.1.0beta2-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236062" comment="libtexluajit2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608580" comment="perl-biber-2017.20170520.svn30357-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236063" comment="perl-biber is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608581" comment="texlive-2017.20170520-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236064" comment="texlive is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608582" comment="texlive-a2ping-bin-2017.20170520.svn27321-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236065" comment="texlive-a2ping-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608583" comment="texlive-accfonts-bin-2017.20170520.svn12688-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236066" comment="texlive-accfonts-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608584" comment="texlive-adhocfilelist-bin-2017.20170520.svn28038-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236067" comment="texlive-adhocfilelist-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608585" comment="texlive-afm2pl-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236068" comment="texlive-afm2pl-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608586" comment="texlive-aleph-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236069" comment="texlive-aleph-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608587" comment="texlive-amstex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236070" comment="texlive-amstex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608588" comment="texlive-arara-bin-2017.20170520.svn29036-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236071" comment="texlive-arara-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608589" comment="texlive-asymptote-bin-2017.20170520.svn43843-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236072" comment="texlive-asymptote-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608590" comment="texlive-authorindex-bin-2017.20170520.svn18790-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236073" comment="texlive-authorindex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608591" comment="texlive-autosp-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236074" comment="texlive-autosp-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608592" comment="texlive-biber-bin-2017.20170520.svn42679-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236075" comment="texlive-biber-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608593" comment="texlive-bibexport-bin-2017.20170520.svn16219-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236076" comment="texlive-bibexport-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608594" comment="texlive-bibtex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236077" comment="texlive-bibtex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608595" comment="texlive-bibtex8-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236078" comment="texlive-bibtex8-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608596" comment="texlive-bibtexu-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236079" comment="texlive-bibtexu-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608597" comment="texlive-bin-devel-2017.20170520-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236080" comment="texlive-bin-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608598" comment="texlive-bundledoc-bin-2017.20170520.svn17794-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236081" comment="texlive-bundledoc-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608599" comment="texlive-cachepic-bin-2017.20170520.svn15543-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236082" comment="texlive-cachepic-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608600" comment="texlive-checkcites-bin-2017.20170520.svn25623-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236083" comment="texlive-checkcites-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608601" comment="texlive-checklistings-bin-2017.20170520.svn38300-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236084" comment="texlive-checklistings-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608602" comment="texlive-chktex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236085" comment="texlive-chktex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608603" comment="texlive-cjk-gs-integrate-bin-2017.20170520.svn37223-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236086" comment="texlive-cjk-gs-integrate-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608604" comment="texlive-cjkutils-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236087" comment="texlive-cjkutils-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608605" comment="texlive-collection-basic-2017.135.svn41616-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285689" comment="texlive-collection-basic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608606" comment="texlive-collection-bibtexextra-2017.135.svn44385-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285690" comment="texlive-collection-bibtexextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608607" comment="texlive-collection-binextra-2017.135.svn44515-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285691" comment="texlive-collection-binextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608608" comment="texlive-collection-context-2017.135.svn42330-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285692" comment="texlive-collection-context is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608609" comment="texlive-collection-fontsextra-2017.135.svn43356-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285693" comment="texlive-collection-fontsextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608610" comment="texlive-collection-fontsrecommended-2017.135.svn35830-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285694" comment="texlive-collection-fontsrecommended is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608611" comment="texlive-collection-fontutils-2017.135.svn37105-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285695" comment="texlive-collection-fontutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608612" comment="texlive-collection-formatsextra-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285696" comment="texlive-collection-formatsextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608613" comment="texlive-collection-games-2017.135.svn42992-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285697" comment="texlive-collection-games is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608614" comment="texlive-collection-humanities-2017.135.svn42268-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285698" comment="texlive-collection-humanities is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608615" comment="texlive-collection-langarabic-2017.135.svn44496-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285699" comment="texlive-collection-langarabic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608616" comment="texlive-collection-langchinese-2017.135.svn42675-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285700" comment="texlive-collection-langchinese is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608617" comment="texlive-collection-langcjk-2017.135.svn43009-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285701" comment="texlive-collection-langcjk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608618" comment="texlive-collection-langcyrillic-2017.135.svn44401-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285702" comment="texlive-collection-langcyrillic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608619" comment="texlive-collection-langczechslovak-2017.135.svn32550-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285703" comment="texlive-collection-langczechslovak is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608620" comment="texlive-collection-langenglish-2017.135.svn43650-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285704" comment="texlive-collection-langenglish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608621" comment="texlive-collection-langeuropean-2017.135.svn44414-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285705" comment="texlive-collection-langeuropean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608622" comment="texlive-collection-langfrench-2017.135.svn40375-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285706" comment="texlive-collection-langfrench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608623" comment="texlive-collection-langgerman-2017.135.svn42045-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285707" comment="texlive-collection-langgerman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608624" comment="texlive-collection-langgreek-2017.135.svn44192-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285708" comment="texlive-collection-langgreek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608625" comment="texlive-collection-langitalian-2017.135.svn30372-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285709" comment="texlive-collection-langitalian is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608626" comment="texlive-collection-langjapanese-2017.135.svn44554-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285710" comment="texlive-collection-langjapanese is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608627" comment="texlive-collection-langkorean-2017.135.svn42106-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285711" comment="texlive-collection-langkorean is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608628" comment="texlive-collection-langother-2017.135.svn44414-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285712" comment="texlive-collection-langother is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608629" comment="texlive-collection-langpolish-2017.135.svn44371-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285713" comment="texlive-collection-langpolish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608630" comment="texlive-collection-langportuguese-2017.135.svn30962-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285714" comment="texlive-collection-langportuguese is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608631" comment="texlive-collection-langspanish-2017.135.svn40587-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285715" comment="texlive-collection-langspanish is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608632" comment="texlive-collection-latex-2017.135.svn41614-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285716" comment="texlive-collection-latex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608633" comment="texlive-collection-latexextra-2017.135.svn44544-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285717" comment="texlive-collection-latexextra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608634" comment="texlive-collection-latexrecommended-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285718" comment="texlive-collection-latexrecommended is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608635" comment="texlive-collection-luatex-2017.135.svn44500-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285719" comment="texlive-collection-luatex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608636" comment="texlive-collection-mathscience-2017.135.svn44396-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285720" comment="texlive-collection-mathscience is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608637" comment="texlive-collection-metapost-2017.135.svn44297-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285721" comment="texlive-collection-metapost is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608638" comment="texlive-collection-music-2017.135.svn40561-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285722" comment="texlive-collection-music is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608639" comment="texlive-collection-pictures-2017.135.svn44395-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285723" comment="texlive-collection-pictures is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608640" comment="texlive-collection-plaingeneric-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285724" comment="texlive-collection-plaingeneric is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608641" comment="texlive-collection-pstricks-2017.135.svn44460-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285725" comment="texlive-collection-pstricks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608642" comment="texlive-collection-publishers-2017.135.svn44485-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285726" comment="texlive-collection-publishers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608643" comment="texlive-collection-xetex-2017.135.svn43059-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285727" comment="texlive-collection-xetex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608644" comment="texlive-context-bin-2017.20170520.svn34112-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236088" comment="texlive-context-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608645" comment="texlive-convbkmk-bin-2017.20170520.svn30408-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236089" comment="texlive-convbkmk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608646" comment="texlive-crossrefware-bin-2017.20170520.svn43866-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236090" comment="texlive-crossrefware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608647" comment="texlive-cslatex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236091" comment="texlive-cslatex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608648" comment="texlive-csplain-bin-2017.20170520.svn33902-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236092" comment="texlive-csplain-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608649" comment="texlive-ctanify-bin-2017.20170520.svn24061-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236093" comment="texlive-ctanify-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608650" comment="texlive-ctanupload-bin-2017.20170520.svn23866-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236094" comment="texlive-ctanupload-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608651" comment="texlive-ctie-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236095" comment="texlive-ctie-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608652" comment="texlive-cweb-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236096" comment="texlive-cweb-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608653" comment="texlive-cyrillic-bin-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236097" comment="texlive-cyrillic-bin-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608654" comment="texlive-de-macro-bin-2017.20170520.svn17399-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236098" comment="texlive-de-macro-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608655" comment="texlive-detex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236099" comment="texlive-detex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608656" comment="texlive-devel-2017.135-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285728" comment="texlive-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608657" comment="texlive-diadia-bin-2017.20170520.svn37645-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236101" comment="texlive-diadia-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608658" comment="texlive-dosepsbin-bin-2017.20170520.svn24759-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236102" comment="texlive-dosepsbin-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608659" comment="texlive-dtl-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236103" comment="texlive-dtl-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608660" comment="texlive-dtxgen-bin-2017.20170520.svn29031-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236104" comment="texlive-dtxgen-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608661" comment="texlive-dviasm-bin-2017.20170520.svn8329-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236105" comment="texlive-dviasm-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608662" comment="texlive-dvicopy-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236106" comment="texlive-dvicopy-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608663" comment="texlive-dvidvi-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236107" comment="texlive-dvidvi-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608664" comment="texlive-dviinfox-bin-2017.20170520.svn44515-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237840" comment="texlive-dviinfox-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608665" comment="texlive-dviljk-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236108" comment="texlive-dviljk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608666" comment="texlive-dvipdfmx-bin-2017.20170520.svn40273-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236109" comment="texlive-dvipdfmx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608667" comment="texlive-dvipng-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236110" comment="texlive-dvipng-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608668" comment="texlive-dvipos-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236111" comment="texlive-dvipos-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608669" comment="texlive-dvips-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236112" comment="texlive-dvips-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608670" comment="texlive-dvisvgm-bin-2017.20170520.svn40987-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236113" comment="texlive-dvisvgm-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608671" comment="texlive-ebong-bin-2017.20170520.svn21000-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236114" comment="texlive-ebong-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608672" comment="texlive-eplain-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236115" comment="texlive-eplain-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608673" comment="texlive-epspdf-bin-2017.20170520.svn29050-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236116" comment="texlive-epspdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608674" comment="texlive-epstopdf-bin-2017.20170520.svn18336-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236117" comment="texlive-epstopdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608675" comment="texlive-exceltex-bin-2017.20170520.svn25860-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236118" comment="texlive-exceltex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608676" comment="texlive-extratools-2017.135-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285729" comment="texlive-extratools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608677" comment="texlive-fig4latex-bin-2017.20170520.svn14752-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236119" comment="texlive-fig4latex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608678" comment="texlive-filesystem-2017.135-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285730" comment="texlive-filesystem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608679" comment="texlive-findhyph-bin-2017.20170520.svn14758-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236120" comment="texlive-findhyph-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608680" comment="texlive-fontinst-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236121" comment="texlive-fontinst-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608681" comment="texlive-fontools-bin-2017.20170520.svn25997-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236122" comment="texlive-fontools-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608682" comment="texlive-fontware-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236123" comment="texlive-fontware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608683" comment="texlive-fragmaster-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236124" comment="texlive-fragmaster-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608684" comment="texlive-getmap-bin-2017.20170520.svn34971-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236125" comment="texlive-getmap-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608685" comment="texlive-glossaries-bin-2017.20170520.svn37813-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236126" comment="texlive-glossaries-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608686" comment="texlive-gregoriotex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236127" comment="texlive-gregoriotex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608687" comment="texlive-gsftopk-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236128" comment="texlive-gsftopk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608688" comment="texlive-jadetex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236129" comment="texlive-jadetex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608689" comment="texlive-kotex-utils-bin-2017.20170520.svn32101-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236131" comment="texlive-kotex-utils-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608690" comment="texlive-kpathsea-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236132" comment="texlive-kpathsea-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608691" comment="texlive-kpathsea-devel-6.2.3-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236133" comment="texlive-kpathsea-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608692" comment="texlive-lacheck-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236134" comment="texlive-lacheck-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608693" comment="texlive-latex-bin-bin-2017.20170520.svn14050-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236135" comment="texlive-latex-bin-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608694" comment="texlive-latex-git-log-bin-2017.20170520.svn30983-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236136" comment="texlive-latex-git-log-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608695" comment="texlive-latex-papersize-bin-2017.20170520.svn42296-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237841" comment="texlive-latex-papersize-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608696" comment="texlive-latex2man-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236137" comment="texlive-latex2man-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608697" comment="texlive-latex2nemeth-bin-2017.20170520.svn42300-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237842" comment="texlive-latex2nemeth-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608698" comment="texlive-latexdiff-bin-2017.20170520.svn16420-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236138" comment="texlive-latexdiff-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608699" comment="texlive-latexfileversion-bin-2017.20170520.svn25012-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236139" comment="texlive-latexfileversion-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608700" comment="texlive-latexindent-bin-2017.20170520.svn32150-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236140" comment="texlive-latexindent-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608701" comment="texlive-latexmk-bin-2017.20170520.svn10937-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236141" comment="texlive-latexmk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608702" comment="texlive-latexpand-bin-2017.20170520.svn27025-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236142" comment="texlive-latexpand-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608703" comment="texlive-lcdftypetools-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236143" comment="texlive-lcdftypetools-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608704" comment="texlive-lilyglyphs-bin-2017.20170520.svn31696-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236144" comment="texlive-lilyglyphs-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608705" comment="texlive-listbib-bin-2017.20170520.svn26126-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236145" comment="texlive-listbib-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608706" comment="texlive-listings-ext-bin-2017.20170520.svn15093-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236146" comment="texlive-listings-ext-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608707" comment="texlive-lollipop-bin-2017.20170520.svn41465-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236147" comment="texlive-lollipop-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608708" comment="texlive-ltxfileinfo-bin-2017.20170520.svn29005-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236148" comment="texlive-ltxfileinfo-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608709" comment="texlive-ltximg-bin-2017.20170520.svn32346-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236149" comment="texlive-ltximg-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608710" comment="texlive-lua2dox-bin-2017.20170520.svn29053-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236150" comment="texlive-lua2dox-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608711" comment="texlive-luaotfload-bin-2017.20170520.svn34647-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236151" comment="texlive-luaotfload-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608712" comment="texlive-luatex-bin-2017.20170520.svn44549-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236152" comment="texlive-luatex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608713" comment="texlive-lwarp-bin-2017.20170520.svn43292-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237843" comment="texlive-lwarp-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608714" comment="texlive-m-tx-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236153" comment="texlive-m-tx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608715" comment="texlive-make4ht-bin-2017.20170520.svn37750-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236154" comment="texlive-make4ht-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608716" comment="texlive-makedtx-bin-2017.20170520.svn38769-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236155" comment="texlive-makedtx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608717" comment="texlive-makeindex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236156" comment="texlive-makeindex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608718" comment="texlive-match_parens-bin-2017.20170520.svn23500-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236157" comment="texlive-match_parens-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608719" comment="texlive-mathspic-bin-2017.20170520.svn23661-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236158" comment="texlive-mathspic-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608720" comment="texlive-metafont-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236159" comment="texlive-metafont-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608721" comment="texlive-metapost-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236160" comment="texlive-metapost-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608722" comment="texlive-mex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236161" comment="texlive-mex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608723" comment="texlive-mf2pt1-bin-2017.20170520.svn23406-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236162" comment="texlive-mf2pt1-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608724" comment="texlive-mflua-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236163" comment="texlive-mflua-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608725" comment="texlive-mfware-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236164" comment="texlive-mfware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608726" comment="texlive-mkgrkindex-bin-2017.20170520.svn14428-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236165" comment="texlive-mkgrkindex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608727" comment="texlive-mkjobtexmf-bin-2017.20170520.svn8457-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236166" comment="texlive-mkjobtexmf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608728" comment="texlive-mkpic-bin-2017.20170520.svn33688-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236167" comment="texlive-mkpic-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608729" comment="texlive-mltex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236168" comment="texlive-mltex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608730" comment="texlive-mptopdf-bin-2017.20170520.svn18674-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236169" comment="texlive-mptopdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608731" comment="texlive-multibibliography-bin-2017.20170520.svn30534-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236170" comment="texlive-multibibliography-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608732" comment="texlive-musixtex-bin-2017.20170520.svn37026-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236171" comment="texlive-musixtex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608733" comment="texlive-musixtnt-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236172" comment="texlive-musixtnt-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608734" comment="texlive-omegaware-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236173" comment="texlive-omegaware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608735" comment="texlive-patgen-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236174" comment="texlive-patgen-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608736" comment="texlive-pax-bin-2017.20170520.svn10843-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236175" comment="texlive-pax-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608737" comment="texlive-pdfbook2-bin-2017.20170520.svn37537-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236176" comment="texlive-pdfbook2-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608738" comment="texlive-pdfcrop-bin-2017.20170520.svn14387-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236177" comment="texlive-pdfcrop-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608739" comment="texlive-pdfjam-bin-2017.20170520.svn17868-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236178" comment="texlive-pdfjam-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608740" comment="texlive-pdflatexpicscale-bin-2017.20170520.svn41779-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237844" comment="texlive-pdflatexpicscale-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608741" comment="texlive-pdftex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236179" comment="texlive-pdftex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608742" comment="texlive-pdftools-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236180" comment="texlive-pdftools-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608743" comment="texlive-pdfxup-bin-2017.20170520.svn40690-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236181" comment="texlive-pdfxup-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608744" comment="texlive-pedigree-perl-bin-2017.20170520.svn25962-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236182" comment="texlive-pedigree-perl-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608745" comment="texlive-perltex-bin-2017.20170520.svn16181-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236183" comment="texlive-perltex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608746" comment="texlive-petri-nets-bin-2017.20170520.svn39165-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236184" comment="texlive-petri-nets-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608747" comment="texlive-pfarrei-bin-2017.20170520.svn29348-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236185" comment="texlive-pfarrei-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608748" comment="texlive-pkfix-bin-2017.20170520.svn13364-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236186" comment="texlive-pkfix-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608749" comment="texlive-pkfix-helper-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236187" comment="texlive-pkfix-helper-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608750" comment="texlive-platex-bin-2017.20170520.svn22859-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236188" comment="texlive-platex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608751" comment="texlive-pmx-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236189" comment="texlive-pmx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608752" comment="texlive-pmxchords-bin-2017.20170520.svn32405-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236190" comment="texlive-pmxchords-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608753" comment="texlive-ps2pk-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236191" comment="texlive-ps2pk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608754" comment="texlive-pst-pdf-bin-2017.20170520.svn7838-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236192" comment="texlive-pst-pdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608755" comment="texlive-pst2pdf-bin-2017.20170520.svn29333-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236193" comment="texlive-pst2pdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608756" comment="texlive-pstools-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236194" comment="texlive-pstools-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608757" comment="texlive-ptex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236195" comment="texlive-ptex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608758" comment="texlive-ptex-fontmaps-bin-2017.20170520.svn44206-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237845" comment="texlive-ptex-fontmaps-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608759" comment="texlive-ptex2pdf-bin-2017.20170520.svn29335-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236196" comment="texlive-ptex2pdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608760" comment="texlive-ptexenc-devel-1.3.5-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236197" comment="texlive-ptexenc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608761" comment="texlive-purifyeps-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236198" comment="texlive-purifyeps-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608762" comment="texlive-pygmentex-bin-2017.20170520.svn34996-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236199" comment="texlive-pygmentex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608763" comment="texlive-pythontex-bin-2017.20170520.svn31638-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236200" comment="texlive-pythontex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608764" comment="texlive-rubik-bin-2017.20170520.svn32919-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236201" comment="texlive-rubik-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608765" comment="texlive-scheme-basic-2017.135.svn25923-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285731" comment="texlive-scheme-basic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608766" comment="texlive-scheme-context-2017.135.svn35799-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285732" comment="texlive-scheme-context is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608767" comment="texlive-scheme-full-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285733" comment="texlive-scheme-full is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608768" comment="texlive-scheme-gust-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285734" comment="texlive-scheme-gust is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608769" comment="texlive-scheme-infraonly-2017.135.svn41515-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285735" comment="texlive-scheme-infraonly is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608770" comment="texlive-scheme-medium-2017.135.svn44177-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285736" comment="texlive-scheme-medium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608771" comment="texlive-scheme-minimal-2017.135.svn13822-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285737" comment="texlive-scheme-minimal is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608772" comment="texlive-scheme-small-2017.135.svn41825-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285738" comment="texlive-scheme-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608773" comment="texlive-scheme-tetex-2017.135.svn44187-lp151.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009285739" comment="texlive-scheme-tetex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608774" comment="texlive-seetexk-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236202" comment="texlive-seetexk-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608775" comment="texlive-splitindex-bin-2017.20170520.svn29688-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236203" comment="texlive-splitindex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608776" comment="texlive-srcredact-bin-2017.20170520.svn38710-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236204" comment="texlive-srcredact-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608777" comment="texlive-sty2dtx-bin-2017.20170520.svn21215-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236205" comment="texlive-sty2dtx-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608778" comment="texlive-svn-multi-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236206" comment="texlive-svn-multi-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608779" comment="texlive-synctex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236207" comment="texlive-synctex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608780" comment="texlive-synctex-devel-1.18-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236208" comment="texlive-synctex-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608781" comment="texlive-tetex-bin-2017.20170520.svn43957-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236209" comment="texlive-tetex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608782" comment="texlive-tex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236210" comment="texlive-tex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608783" comment="texlive-tex4ebook-bin-2017.20170520.svn37771-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236211" comment="texlive-tex4ebook-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608784" comment="texlive-tex4ht-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236212" comment="texlive-tex4ht-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608785" comment="texlive-texconfig-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236213" comment="texlive-texconfig-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608786" comment="texlive-texcount-bin-2017.20170520.svn13013-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236214" comment="texlive-texcount-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608787" comment="texlive-texdef-bin-2017.20170520.svn21802-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236215" comment="texlive-texdef-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608788" comment="texlive-texdiff-bin-2017.20170520.svn15506-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236216" comment="texlive-texdiff-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608789" comment="texlive-texdirflatten-bin-2017.20170520.svn12782-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236217" comment="texlive-texdirflatten-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608790" comment="texlive-texdoc-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236218" comment="texlive-texdoc-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608791" comment="texlive-texfot-bin-2017.20170520.svn33155-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236219" comment="texlive-texfot-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608792" comment="texlive-texliveonfly-bin-2017.20170520.svn24062-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236220" comment="texlive-texliveonfly-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608793" comment="texlive-texloganalyser-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236221" comment="texlive-texloganalyser-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608794" comment="texlive-texlua-devel-5.2.4-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236222" comment="texlive-texlua-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608795" comment="texlive-texluajit-devel-2.1.0beta2-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236223" comment="texlive-texluajit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608796" comment="texlive-texosquery-bin-2017.20170520.svn43596-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237846" comment="texlive-texosquery-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608797" comment="texlive-texsis-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236224" comment="texlive-texsis-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608798" comment="texlive-texware-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236225" comment="texlive-texware-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608799" comment="texlive-thumbpdf-bin-2017.20170520.svn6898-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236226" comment="texlive-thumbpdf-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608800" comment="texlive-tie-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236227" comment="texlive-tie-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608801" comment="texlive-tpic2pdftex-bin-2017.20170520.svn29741-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236228" comment="texlive-tpic2pdftex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608802" comment="texlive-ttfutils-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236229" comment="texlive-ttfutils-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608803" comment="texlive-typeoutfileinfo-bin-2017.20170520.svn25648-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236230" comment="texlive-typeoutfileinfo-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608804" comment="texlive-ulqda-bin-2017.20170520.svn13663-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236231" comment="texlive-ulqda-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608805" comment="texlive-uplatex-bin-2017.20170520.svn26326-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236232" comment="texlive-uplatex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608806" comment="texlive-uptex-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236233" comment="texlive-uptex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608807" comment="texlive-urlbst-bin-2017.20170520.svn23262-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236234" comment="texlive-urlbst-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608808" comment="texlive-velthuis-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009237847" comment="texlive-velthuis-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608809" comment="texlive-vlna-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236235" comment="texlive-vlna-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608810" comment="texlive-vpe-bin-2017.20170520.svn6897-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236236" comment="texlive-vpe-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608811" comment="texlive-web-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236237" comment="texlive-web-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608812" comment="texlive-xdvi-bin-2017.20170520.svn44143-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236238" comment="texlive-xdvi-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608813" comment="texlive-xetex-bin-2017.20170520.svn44361-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236239" comment="texlive-xetex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608814" comment="texlive-xmltex-bin-2017.20170520.svn3006-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236240" comment="texlive-xmltex-bin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608815" comment="texlive-yplan-bin-2017.20170520.svn34398-lp151.12.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236241" comment="texlive-yplan-bin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8022</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8022" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00066.html" source="SUSE-SU"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022</cve>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172562">SUSE bug 1172562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609127" comment="tomcat-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609128" comment="tomcat-admin-webapps-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609129" comment="tomcat-docs-webapp-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609130" comment="tomcat-el-3_0-api-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609131" comment="tomcat-embed-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609132" comment="tomcat-javadoc-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609133" comment="tomcat-jsp-2_3-api-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609134" comment="tomcat-jsvc-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609135" comment="tomcat-lib-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609136" comment="tomcat-servlet-4_0-api-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609137" comment="tomcat-webapps-9.0.35-lp151.3.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8023</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00029.html" source="SUSE-SU"/>
    <description>
    A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SECURITY, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to escalate privileges from user ldap to root. This issue affects: SUSE Enterprise Storage 5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Debuginfo 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Debuginfo 11-SP4 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Point of Sale 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 11-SECURITY openldap2-client-openssl1 versions prior to 2.4.26-0.74.13.1. SUSE Linux Enterprise Server 11-SP4-LTSS openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 12-SP2-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP2-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP4 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.31.1. SUSE Linux Enterprise Server for SAP 12-SP2 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 12-SP3 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.31.1. SUSE OpenStack Cloud 7 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud 8 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud Crowbar 8 openldap2 versions prior to 2.4.41-18.71.2. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.12.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190347">SUSE bug 1190347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609207" comment="libldap-2_4-2-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609208" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609209" comment="libldap-data-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609210" comment="openldap2-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609211" comment="openldap2-back-meta-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609212" comment="openldap2-back-perl-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609213" comment="openldap2-back-sock-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609214" comment="openldap2-back-sql-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609215" comment="openldap2-client-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609216" comment="openldap2-contrib-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609217" comment="openldap2-devel-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609218" comment="openldap2-devel-32bit-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609219" comment="openldap2-devel-static-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609220" comment="openldap2-doc-2.4.46-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609221" comment="openldap2-ppolicy-check-password-1.2-lp151.10.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8024</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8024" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8024" ref_url="https://www.suse.com/security/cve/CVE-2020-8024" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00022.html" source="SUSE-SU"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of hylafax+ of openSUSE Leap 15.2, openSUSE Leap 15.1, openSUSE Factory allows local attackers to escalate from user uucp to users calling hylafax binaries. This issue affects: openSUSE Leap 15.2 hylafax+ versions prior to 7.0.2-lp152.2.1. openSUSE Leap 15.1 hylafax+ version 5.6.1-lp151.3.7 and prior versions. openSUSE Factory hylafax+ versions prior to 7.0.2-2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8024/">CVE-2020-8024</cve>
	<bugzilla href="https://bugzilla.suse.com/1172731">SUSE bug 1172731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609959" comment="hylafax+-7.0.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235038" comment="hylafax+ is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609960" comment="hylafax+-client-7.0.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009235040" comment="hylafax+-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609226" comment="libfaxutil7_0_2-7.0.2-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287514" comment="libfaxutil7_0_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609961" comment="libfaxutil7_0_3-7.0.3-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289522" comment="libfaxutil7_0_3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8026</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8026" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8026" ref_url="https://www.suse.com/security/cve/CVE-2020-8026" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html" source="SUSE-SU"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8026/">CVE-2020-8026</cve>
	<bugzilla href="https://bugzilla.suse.com/1172573">SUSE bug 1172573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604992" comment="inn-2.5.4-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278741" comment="inn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604993" comment="inn-devel-2.5.4-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278742" comment="inn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604994" comment="mininews-2.5.4-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009278743" comment="mininews is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8027</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8027" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8027" ref_url="https://www.suse.com/security/cve/CVE-2020-8027" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2712-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00094.html" source="SUSE-SU"/>
    <description>
    A Insecure Temporary File vulnerability in openldap2 of SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to overwrite arbitrary files and gain access to the openldap2 configuration This issue affects: SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.37.1. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.37.1. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.18.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8027/">CVE-2020-8027</cve>
	<bugzilla href="https://bugzilla.suse.com/1175568">SUSE bug 1175568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605401" comment="libldap-2_4-2-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605402" comment="libldap-2_4-2-32bit-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152790" comment="libldap-2_4-2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605403" comment="libldap-data-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605404" comment="openldap2-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152657" comment="openldap2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605405" comment="openldap2-back-meta-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152793" comment="openldap2-back-meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605406" comment="openldap2-back-perl-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152794" comment="openldap2-back-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605407" comment="openldap2-back-sock-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162108" comment="openldap2-back-sock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605408" comment="openldap2-back-sql-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152795" comment="openldap2-back-sql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605409" comment="openldap2-client-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152796" comment="openldap2-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605410" comment="openldap2-contrib-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162109" comment="openldap2-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605411" comment="openldap2-devel-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152797" comment="openldap2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605412" comment="openldap2-devel-32bit-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152798" comment="openldap2-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605413" comment="openldap2-devel-static-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152799" comment="openldap2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605414" comment="openldap2-doc-2.4.46-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152800" comment="openldap2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605415" comment="openldap2-ppolicy-check-password-1.2-lp151.10.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162110" comment="openldap2-ppolicy-check-password is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8037</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8037" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LS4ETM3JSH2SWUOYCYLRBRPQPCJ7QXGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1986-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLS7QAB5MKRGXWLJ5MLIV2TPU4TWVXE5/" source="SUSE-SU"/>
    <description>
    The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037</cve>
	<bugzilla href="https://bugzilla.suse.com/1178466">SUSE bug 1178466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606204" comment="tcpdump-4.9.2-lp151.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152520" comment="tcpdump is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8118</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8118" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8118" ref_url="https://www.suse.com/security/cve/CVE-2020-8118" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html" source="SUSE-SU"/>
    <description>
    An authenticated server-side request forgery in Nextcloud server 16.0.1 allowed to detect local and remote services when adding a new subscription in the calendar application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8118/">CVE-2020-8118</cve>
	<bugzilla href="https://bugzilla.suse.com/1162782">SUSE bug 1162782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609780" comment="nextcloud-15.0.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8119</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8119" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8119" ref_url="https://www.suse.com/security/cve/CVE-2020-8119" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html" source="SUSE-SU"/>
    <description>
    Improper authorization in Nextcloud server 17.0.0 causes leaking of previews and files when a file-drop share link is opened via the gallery app.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8119/">CVE-2020-8119</cve>
	<bugzilla href="https://bugzilla.suse.com/1162781">SUSE bug 1162781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609780" comment="nextcloud-15.0.14-lp151.2.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8130</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8130" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8130" ref_url="https://www.suse.com/security/cve/CVE-2020-8130" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    There is an OS command injection vulnerability in Ruby Rake &lt; 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8130/">CVE-2020-8130</cve>
	<bugzilla href="https://bugzilla.suse.com/1164804">SUSE bug 1164804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607294" comment="libruby2_5-2_5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260282" comment="libruby2_5-2_5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607295" comment="ruby2.5-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260286" comment="ruby2.5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607296" comment="ruby2.5-devel-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260288" comment="ruby2.5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607297" comment="ruby2.5-devel-extra-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260290" comment="ruby2.5-devel-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607298" comment="ruby2.5-doc-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260292" comment="ruby2.5-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607299" comment="ruby2.5-doc-ri-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260294" comment="ruby2.5-doc-ri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607300" comment="ruby2.5-stdlib-2.5.7-lp151.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260296" comment="ruby2.5-stdlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8154</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8154" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8154" ref_url="https://www.suse.com/security/cve/CVE-2020-8154" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8154/">CVE-2020-8154</cve>
	<bugzilla href="https://bugzilla.suse.com/1171579">SUSE bug 1171579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609962" comment="nextcloud-20.0.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8155</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8155" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8155" ref_url="https://www.suse.com/security/cve/CVE-2020-8155" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    An outdated 3rd party library in the Files PDF viewer for Nextcloud Server 18.0.2 caused a Cross-site scripting vulnerability when opening a malicious PDF.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-8155/">CVE-2020-8155</cve>
	<bugzilla href="https://bugzilla.suse.com/1171572">SUSE bug 1171572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609962" comment="nextcloud-20.0.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8164</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8164" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A deserialization of untrusted data vulnerability exists in rails &lt; 5.2.4.3, rails &lt; 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164</cve>
	<bugzilla href="https://bugzilla.suse.com/1172177">SUSE bug 1172177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605399" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253149" comment="ruby2.5-rubygem-actionpack-5_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605400" comment="ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253150" comment="ruby2.5-rubygem-actionpack-doc-5_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8165</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8165" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A deserialization of untrusted data vulnernerability exists in rails &lt; 5.2.4.3, rails &lt; 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165</cve>
	<bugzilla href="https://bugzilla.suse.com/1172186">SUSE bug 1172186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605557" comment="ruby2.5-rubygem-activesupport-5_1-5.1.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295961" comment="ruby2.5-rubygem-activesupport-5_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605558" comment="ruby2.5-rubygem-activesupport-doc-5_1-5.1.4-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009295962" comment="ruby2.5-rubygem-activesupport-doc-5_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8166</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A CSRF forgery vulnerability exists in rails &lt; 5.2.5, rails &lt; 6.0.4 that makes it possible for an attacker to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166</cve>
	<bugzilla href="https://bugzilla.suse.com/1172182">SUSE bug 1172182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8167</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8167" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8167" ref_url="https://www.suse.com/security/cve/CVE-2020-8167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A CSRF vulnerability exists in rails &lt;= 6.0.3 rails-ujs module that could allow attackers to send CSRF tokens to wrong domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8167/">CVE-2020-8167</cve>
	<bugzilla href="https://bugzilla.suse.com/1172184">SUSE bug 1172184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8174</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8174" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" source="SUSE-SU"/>
    <description>
    napi_get_value_string_*() allows various kinds of memory corruption in node &lt; 10.21.0, 12.18.0, and &lt; 14.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174</cve>
	<bugzilla href="https://bugzilla.suse.com/1172443">SUSE bug 1172443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608569" comment="nodejs8-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230278" comment="nodejs8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608570" comment="nodejs8-devel-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230279" comment="nodejs8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608571" comment="nodejs8-docs-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230280" comment="nodejs8-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608572" comment="npm8-8.17.0-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009230281" comment="npm8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8177</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00072.html" source="SUSE-SU"/>
    <description>
    curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609118" comment="curl-7.60.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609119" comment="curl-mini-7.60.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609120" comment="libcurl-devel-7.60.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609121" comment="libcurl-devel-32bit-7.60.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609122" comment="libcurl-mini-devel-7.60.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609123" comment="libcurl4-7.60.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609124" comment="libcurl4-32bit-7.60.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609125" comment="libcurl4-mini-7.60.0-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8183</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8183" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8183" ref_url="https://www.suse.com/security/cve/CVE-2020-8183" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8183/">CVE-2020-8183</cve>
	<bugzilla href="https://bugzilla.suse.com/1178384">SUSE bug 1178384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609962" comment="nextcloud-20.0.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8184</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8184" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A reliance on cookies without validation/integrity check security vulnerability exists in rack &lt; 2.2.3, rack &lt; 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-26"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184</cve>
	<bugzilla href="https://bugzilla.suse.com/1173351">SUSE bug 1173351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193081">SUSE bug 1193081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8185</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8185" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability exists in Rails &lt;6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185</cve>
	<bugzilla href="https://bugzilla.suse.com/1173564">SUSE bug 1173564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606227" comment="rmt-server-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244412" comment="rmt-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606228" comment="rmt-server-config-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266831" comment="rmt-server-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606229" comment="rmt-server-pubcloud-2.6.5-lp151.2.18.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244413" comment="rmt-server-pubcloud is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8228</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8228" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8228" ref_url="https://www.suse.com/security/cve/CVE-2020-8228" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8228/">CVE-2020-8228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609962" comment="nextcloud-20.0.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8231</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00069.html" source="SUSE-SU"/>
    <description>
    Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231</cve>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605077" comment="curl-7.60.0-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605078" comment="curl-mini-7.60.0-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605079" comment="libcurl-devel-7.60.0-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605080" comment="libcurl-devel-32bit-7.60.0-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605081" comment="libcurl-mini-devel-7.60.0-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605082" comment="libcurl4-7.60.0-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605083" comment="libcurl4-32bit-7.60.0-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605084" comment="libcurl4-mini-7.60.0-lp151.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8233</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8233" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8233" ref_url="https://www.suse.com/security/cve/CVE-2020-8233" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00019.html" source="SUSE-SU"/>
    <description>
    A command injection vulnerability exists in EdgeSwitch firmware &lt;v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-8233/">CVE-2020-8233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609962" comment="nextcloud-20.0.0-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009164979" comment="nextcloud is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8265</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYFKSVZAWD7RDU5OST2FANHMDWL4VNM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
    <description>
    Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265</cve>
	<bugzilla href="https://bugzilla.suse.com/1180553">SUSE bug 1180553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609609" comment="nodejs10-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609610" comment="nodejs10-devel-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609611" comment="nodejs10-docs-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609612" comment="npm10-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8277</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8277" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTWRQJHU72Z3SIFY23FTPWRPBJZFDROF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7UCQ5MCCDUAGSMKN2NKE5XIFE37DNED/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYFKSVZAWD7RDU5OST2FANHMDWL4VNM7/" source="SUSE-SU"/>
    <description>
    A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions &lt; 15.2.1, &lt; 14.15.1, and &lt; 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277</cve>
	<bugzilla href="https://bugzilla.suse.com/1178882">SUSE bug 1178882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606331" comment="c-ares-devel-1.17.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300208" comment="c-ares-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606332" comment="c-ares-utils-1.17.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009300210" comment="c-ares-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606333" comment="libcares2-1.17.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606334" comment="libcares2-32bit-1.17.0-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153707" comment="libcares2-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8284</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284</cve>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606741" comment="curl-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606742" comment="curl-mini-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606743" comment="libcurl-devel-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606744" comment="libcurl-devel-32bit-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606745" comment="libcurl-mini-devel-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606746" comment="libcurl4-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606747" comment="libcurl4-32bit-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606748" comment="libcurl4-mini-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8285</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285</cve>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606741" comment="curl-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606742" comment="curl-mini-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606743" comment="libcurl-devel-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606744" comment="libcurl-devel-32bit-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606745" comment="libcurl-mini-devel-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606746" comment="libcurl4-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606747" comment="libcurl4-32bit-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606748" comment="libcurl4-mini-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8286</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286</cve>
	<bugzilla href="https://bugzilla.suse.com/1179593">SUSE bug 1179593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606741" comment="curl-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606742" comment="curl-mini-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223333" comment="curl-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606743" comment="libcurl-devel-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606744" comment="libcurl-devel-32bit-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153284" comment="libcurl-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606745" comment="libcurl-mini-devel-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223334" comment="libcurl-mini-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606746" comment="libcurl4-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606747" comment="libcurl4-32bit-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153285" comment="libcurl4-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606748" comment="libcurl4-mini-7.60.0-lp151.5.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223335" comment="libcurl4-mini is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8287</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYFKSVZAWD7RDU5OST2FANHMDWL4VNM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0195-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBRCEZ5AUMB5RCV3OQ3WB7MSZEL755XF/" source="SUSE-SU"/>
    <description>
    Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287</cve>
	<bugzilla href="https://bugzilla.suse.com/1180554">SUSE bug 1180554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609609" comment="nodejs10-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251313" comment="nodejs10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609610" comment="nodejs10-devel-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251314" comment="nodejs10-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609611" comment="nodejs10-docs-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251315" comment="nodejs10-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609612" comment="npm10-10.23.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251316" comment="npm10 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8428</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<bugzilla href="https://bugzilla.suse.com/1162109">SUSE bug 1162109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8432</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8432" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8432" ref_url="https://www.suse.com/security/cve/CVE-2020-8432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007760.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY7PFRXKSIEBEZBSKFM57JGCIQJEJZL6/" source="SUSE-SU"/>
    <description>
    In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8432/">CVE-2020-8432</cve>
	<bugzilla href="https://bugzilla.suse.com/1162198">SUSE bug 1162198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606172" comment="u-boot-tools-2019.01-lp151.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009267105" comment="u-boot-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8449</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8449" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607823" comment="squid-4.10-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8450</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8450" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607823" comment="squid-4.10-lp151.2.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8492</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606883" comment="libpython3_6m1_0-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606884" comment="libpython3_6m1_0-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244052" comment="libpython3_6m1_0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606885" comment="python3-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606886" comment="python3-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152171" comment="python3-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606887" comment="python3-base-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606888" comment="python3-base-32bit-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152172" comment="python3-base-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606889" comment="python3-curses-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151917" comment="python3-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606890" comment="python3-dbm-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151918" comment="python3-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606891" comment="python3-devel-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152173" comment="python3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606892" comment="python3-doc-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152174" comment="python3-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606893" comment="python3-doc-devhelp-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009340456" comment="python3-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606894" comment="python3-idle-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152176" comment="python3-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606895" comment="python3-testsuite-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152177" comment="python3-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606896" comment="python3-tk-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151919" comment="python3-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606897" comment="python3-tools-3.6.12-lp151.6.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152178" comment="python3-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8517</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8517" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. Due to incorrect input validation, the NTLM authentication credentials parser in ext_lm_group_acl may write to memory outside the credentials buffer. On systems with memory access protections, this can result in the helper process being terminated unexpectedly. This leads to the Squid process also terminating and a denial of service for all clients using the proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-13"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607858" comment="squid-4.11-lp151.2.15.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8597</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8597" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html" source="SUSE-SU"/>
    <description>
    eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606992" comment="ppp-2.4.7-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152115" comment="ppp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606993" comment="ppp-devel-2.4.7-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152785" comment="ppp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606994" comment="ppp-modem-2.4.7-lp151.5.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009279345" comment="ppp-modem is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8608</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607382" comment="qemu-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607383" comment="qemu-arm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607384" comment="qemu-audio-alsa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607385" comment="qemu-audio-oss-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607386" comment="qemu-audio-pa-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607387" comment="qemu-audio-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266840" comment="qemu-audio-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607388" comment="qemu-block-curl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607389" comment="qemu-block-dmg-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607390" comment="qemu-block-gluster-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223339" comment="qemu-block-gluster is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607391" comment="qemu-block-iscsi-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607392" comment="qemu-block-nfs-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607393" comment="qemu-block-rbd-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607394" comment="qemu-block-ssh-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607395" comment="qemu-extra-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607396" comment="qemu-guest-agent-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607397" comment="qemu-ipxe-1.0.0+-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607398" comment="qemu-ksm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607399" comment="qemu-kvm-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151110" comment="qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607400" comment="qemu-lang-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607401" comment="qemu-linux-user-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607402" comment="qemu-ppc-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607403" comment="qemu-s390-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151114" comment="qemu-s390 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607404" comment="qemu-seabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607405" comment="qemu-sgabios-8-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607406" comment="qemu-tools-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607407" comment="qemu-ui-curses-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607408" comment="qemu-ui-gtk-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607409" comment="qemu-ui-sdl-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266844" comment="qemu-ui-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607410" comment="qemu-vgabios-1.12.0-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607411" comment="qemu-x86-3.1.1.1-lp151.7.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8616</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8617</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8618</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8618" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8618" ref_url="https://www.suse.com/security/cve/CVE-2020-8618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8618/">CVE-2020-8618</cve>
	<bugzilla href="https://bugzilla.suse.com/1172958">SUSE bug 1172958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8619</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8619" ref_url="https://www.suse.com/security/cve/CVE-2020-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In ISC BIND9 versions BIND 9.11.14 -&gt; 9.11.19, BIND 9.14.9 -&gt; 9.14.12, BIND 9.16.0 -&gt; 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -&gt; 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk ("*") character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8619/">CVE-2020-8619</cve>
	<bugzilla href="https://bugzilla.suse.com/1172958">SUSE bug 1172958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8620</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8620" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8620" ref_url="https://www.suse.com/security/cve/CVE-2020-8620" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.15.6 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8620/">CVE-2020-8620</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8621</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8621" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8621" ref_url="https://www.suse.com/security/cve/CVE-2020-8621" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.14.0 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8621/">CVE-2020-8621</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8622</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.0.0 -&gt; 9.11.21, 9.12.0 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.9.3-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8623</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.10.0 -&gt; 9.11.21, 9.12.0 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.10.5-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8624</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.9.12 -&gt; 9.9.13, 9.10.7 -&gt; 9.10.8, 9.11.3 -&gt; 9.11.21, 9.12.1 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.9.12-S1 -&gt; 9.9.13-S1, 9.11.3-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605656" comment="bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605657" comment="bind-chrootenv-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151204" comment="bind-chrootenv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605658" comment="bind-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153102" comment="bind-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605659" comment="bind-devel-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256539" comment="bind-devel-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605660" comment="bind-doc-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605661" comment="bind-utils-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605662" comment="libbind9-1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296220" comment="libbind9-1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605663" comment="libbind9-1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296221" comment="libbind9-1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605664" comment="libdns1605-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296222" comment="libdns1605 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605665" comment="libdns1605-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296223" comment="libdns1605-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605666" comment="libirs-devel-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009256550" comment="libirs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605667" comment="libirs1601-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296224" comment="libirs1601 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605668" comment="libirs1601-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296225" comment="libirs1601-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605669" comment="libisc1606-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296226" comment="libisc1606 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605670" comment="libisc1606-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296227" comment="libisc1606-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605671" comment="libisccc1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296228" comment="libisccc1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605672" comment="libisccc1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296229" comment="libisccc1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605673" comment="libisccfg1600-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296230" comment="libisccfg1600 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605674" comment="libisccfg1600-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296231" comment="libisccfg1600-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605675" comment="libns1604-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296232" comment="libns1604 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605676" comment="libns1604-32bit-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296233" comment="libns1604-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605677" comment="libuv-devel-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296235" comment="libuv-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605678" comment="libuv1-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296236" comment="libuv1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605679" comment="libuv1-32bit-1.18.0-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296237" comment="libuv1-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605680" comment="python3-bind-9.16.6-lp151.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177148" comment="python3-bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605681" comment="sysuser-shadow-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296238" comment="sysuser-shadow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605682" comment="sysuser-tools-2.0-lp151.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009296239" comment="sysuser-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8631</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8631" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8631" ref_url="https://www.suse.com/security/cve/CVE-2020-8631" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html" source="SUSE-SU"/>
    <description>
    cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8631/">CVE-2020-8631</cve>
	<bugzilla href="https://bugzilla.suse.com/1162937">SUSE bug 1162937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607307" comment="cloud-init-19.4-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273021" comment="cloud-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607308" comment="cloud-init-config-suse-19.4-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273022" comment="cloud-init-config-suse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607309" comment="cloud-init-doc-19.4-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273023" comment="cloud-init-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8632</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8632" ref_url="https://www.suse.com/security/cve/CVE-2020-8632" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html" source="SUSE-SU"/>
    <description>
    In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8632/">CVE-2020-8632</cve>
	<bugzilla href="https://bugzilla.suse.com/1162936">SUSE bug 1162936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607307" comment="cloud-init-19.4-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273021" comment="cloud-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607308" comment="cloud-init-config-suse-19.4-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273022" comment="cloud-init-config-suse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607309" comment="cloud-init-doc-19.4-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273023" comment="cloud-init-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8647</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607273" comment="kernel-debug-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607274" comment="kernel-debug-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607275" comment="kernel-debug-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607276" comment="kernel-default-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607277" comment="kernel-default-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607278" comment="kernel-default-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607279" comment="kernel-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607280" comment="kernel-docs-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607281" comment="kernel-docs-html-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607282" comment="kernel-kvmsmall-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607283" comment="kernel-kvmsmall-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607284" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607285" comment="kernel-macros-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607286" comment="kernel-obs-build-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607287" comment="kernel-obs-qa-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607288" comment="kernel-source-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607289" comment="kernel-source-vanilla-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607290" comment="kernel-syms-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607291" comment="kernel-vanilla-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607292" comment="kernel-vanilla-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607293" comment="kernel-vanilla-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8648</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8649</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607273" comment="kernel-debug-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607274" comment="kernel-debug-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607275" comment="kernel-debug-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607276" comment="kernel-default-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607277" comment="kernel-default-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607278" comment="kernel-default-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607279" comment="kernel-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607280" comment="kernel-docs-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607281" comment="kernel-docs-html-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607282" comment="kernel-kvmsmall-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607283" comment="kernel-kvmsmall-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607284" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607285" comment="kernel-macros-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607286" comment="kernel-obs-build-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607287" comment="kernel-obs-qa-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607288" comment="kernel-source-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607289" comment="kernel-source-vanilla-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607290" comment="kernel-syms-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607291" comment="kernel-vanilla-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607292" comment="kernel-vanilla-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607293" comment="kernel-vanilla-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8694</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179661">SUSE bug 1179661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606106" comment="kernel-debug-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606107" comment="kernel-debug-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606108" comment="kernel-debug-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606109" comment="kernel-default-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606110" comment="kernel-default-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606111" comment="kernel-default-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606112" comment="kernel-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606113" comment="kernel-docs-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606114" comment="kernel-docs-html-4.12.14-lp151.28.79.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606115" comment="kernel-kvmsmall-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606116" comment="kernel-kvmsmall-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606117" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606118" comment="kernel-macros-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606119" comment="kernel-obs-build-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606120" comment="kernel-obs-qa-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606121" comment="kernel-source-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606122" comment="kernel-source-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606123" comment="kernel-syms-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606124" comment="kernel-vanilla-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606125" comment="kernel-vanilla-base-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606126" comment="kernel-vanilla-devel-4.12.14-lp151.28.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8695</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606502" comment="ucode-intel-20201118-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8696</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606502" comment="ucode-intel-20201118-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8698</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606502" comment="ucode-intel-20201118-lp151.2.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8813</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8813" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8813" ref_url="https://www.suse.com/security/cve/CVE-2020-8813" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" source="SUSE-SU"/>
    <description>
    graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8813/">CVE-2020-8813</cve>
	<bugzilla href="https://bugzilla.suse.com/1154087">SUSE bug 1154087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160867">SUSE bug 1160867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164675">SUSE bug 1164675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609614" comment="cacti-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152167" comment="cacti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609615" comment="cacti-spine-1.2.11-lp151.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153174" comment="cacti-spine is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8834</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8834" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8834" ref_url="https://www.suse.com/security/cve/CVE-2020-8834" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can cause the host kernel to panic. There were two commits that, according to the reporter, introduced the vulnerability: f024ee098476 ("KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures") 87a11bb6a7f7 ("KVM: PPC: Book3S HV: Work around XER[SO] bug in fake suspend mode") The former landed in 4.8, the latter in 4.17. This was fixed without realizing the impact in 4.18 with the following three commits, though it's believed the first is the only strictly necessary commit: 6f597c6b63b6 ("KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm()") 7b0e827c6970 ("KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm") 009c872a8bc4 ("KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file")
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8834/">CVE-2020-8834</cve>
	<bugzilla href="https://bugzilla.suse.com/1168276">SUSE bug 1168276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173945">SUSE bug 1173945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607559" comment="kernel-debug-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607560" comment="kernel-debug-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607561" comment="kernel-debug-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607562" comment="kernel-default-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607563" comment="kernel-default-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607564" comment="kernel-default-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607565" comment="kernel-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607566" comment="kernel-docs-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607567" comment="kernel-docs-html-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607568" comment="kernel-kvmsmall-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607569" comment="kernel-kvmsmall-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607570" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607571" comment="kernel-macros-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607572" comment="kernel-obs-build-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607573" comment="kernel-obs-qa-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607574" comment="kernel-source-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607575" comment="kernel-source-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607576" comment="kernel-syms-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607577" comment="kernel-vanilla-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607578" comment="kernel-vanilla-base-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607579" comment="kernel-vanilla-devel-4.12.14-lp151.28.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8903</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8903" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8903" ref_url="https://www.suse.com/security/cve/CVE-2020-8903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html" source="SUSE-SU"/>
    <description>
    A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "adm" group, users with this role are able to read the DHCP XID from the systemd journal. Using the DHCP XID, it is then possible to set the IP address and hostname of the instance to any value, which is then stored in /etc/hosts. An attacker can then point metadata.google.internal to an arbitrary IP address and impersonate the GCE metadata server which make it is possible to instruct the OS Login PAM module to grant administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "adm" user from the OS Login entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8903/">CVE-2020-8903</cve>
	<bugzilla href="https://bugzilla.suse.com/1173258">SUSE bug 1173258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609345" comment="google-compute-engine-init-20190801-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287516" comment="google-compute-engine-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609346" comment="google-compute-engine-oslogin-20190801-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287517" comment="google-compute-engine-oslogin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609347" comment="google-compute-engine-oslogin-32bit-20190801-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287518" comment="google-compute-engine-oslogin-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8907</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8907" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8907" ref_url="https://www.suse.com/security/cve/CVE-2020-8907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html" source="SUSE-SU"/>
    <description>
    A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "docker" group, an attacker with this role is able to run docker and mount the host OS. Within docker, it is possible to modify the host OS filesystem and modify /etc/groups to gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "docker" user from the OS Login entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8907/">CVE-2020-8907</cve>
	<bugzilla href="https://bugzilla.suse.com/1173258">SUSE bug 1173258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609345" comment="google-compute-engine-init-20190801-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287516" comment="google-compute-engine-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609346" comment="google-compute-engine-oslogin-20190801-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287517" comment="google-compute-engine-oslogin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609347" comment="google-compute-engine-oslogin-32bit-20190801-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287518" comment="google-compute-engine-oslogin-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8933</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8933" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8933" ref_url="https://www.suse.com/security/cve/CVE-2020-8933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html" source="SUSE-SU"/>
    <description>
    A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using the membership to the "lxd" group, an attacker can attach host devices and filesystems. Within an lxc container, it is possible to attach the host OS filesystem and modify /etc/sudoers to then gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "lxd" user from the OS Login entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8933/">CVE-2020-8933</cve>
	<bugzilla href="https://bugzilla.suse.com/1173258">SUSE bug 1173258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609345" comment="google-compute-engine-init-20190801-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287516" comment="google-compute-engine-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609346" comment="google-compute-engine-oslogin-20190801-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287517" comment="google-compute-engine-oslogin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609347" comment="google-compute-engine-oslogin-32bit-20190801-lp151.2.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287518" comment="google-compute-engine-oslogin-32bit is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8955</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8955" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8955" ref_url="https://www.suse.com/security/cve/CVE-2020-8955" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00032.html" source="SUSE-SU"/>
    <description>
    irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8955/">CVE-2020-8955</cve>
	<bugzilla href="https://bugzilla.suse.com/1163889">SUSE bug 1163889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609963" comment="weechat-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155009" comment="weechat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609964" comment="weechat-aspell-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155010" comment="weechat-aspell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609965" comment="weechat-devel-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155011" comment="weechat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609966" comment="weechat-guile-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155013" comment="weechat-guile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609967" comment="weechat-lang-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155014" comment="weechat-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609968" comment="weechat-lua-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155015" comment="weechat-lua is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609969" comment="weechat-perl-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155016" comment="weechat-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609970" comment="weechat-python-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155017" comment="weechat-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609971" comment="weechat-ruby-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155018" comment="weechat-ruby is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609972" comment="weechat-tcl-2.1-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155019" comment="weechat-tcl is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8992</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8992" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607042" comment="kernel-debug-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607043" comment="kernel-debug-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607044" comment="kernel-debug-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607045" comment="kernel-default-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607046" comment="kernel-default-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607047" comment="kernel-default-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607048" comment="kernel-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607049" comment="kernel-docs-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607050" comment="kernel-docs-html-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607051" comment="kernel-kvmsmall-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607052" comment="kernel-kvmsmall-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607053" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607054" comment="kernel-macros-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607055" comment="kernel-obs-build-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607056" comment="kernel-obs-qa-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607057" comment="kernel-source-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607058" comment="kernel-source-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607059" comment="kernel-syms-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607060" comment="kernel-vanilla-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607061" comment="kernel-vanilla-base-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607062" comment="kernel-vanilla-devel-4.12.14-lp151.28.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9272</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9272" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9272" ref_url="https://www.suse.com/security/cve/CVE-2020-9272" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html" source="SUSE-SU"/>
    <description>
    ProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9272/">CVE-2020-9272</cve>
	<bugzilla href="https://bugzilla.suse.com/1164572">SUSE bug 1164572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609973" comment="proftpd-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153640" comment="proftpd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609974" comment="proftpd-devel-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153641" comment="proftpd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609975" comment="proftpd-doc-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153642" comment="proftpd-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609976" comment="proftpd-lang-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153643" comment="proftpd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609977" comment="proftpd-ldap-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153644" comment="proftpd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609978" comment="proftpd-mysql-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153645" comment="proftpd-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609979" comment="proftpd-pgsql-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153646" comment="proftpd-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609980" comment="proftpd-radius-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153647" comment="proftpd-radius is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609981" comment="proftpd-sqlite-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153648" comment="proftpd-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9273</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9273" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9273" ref_url="https://www.suse.com/security/cve/CVE-2020-9273" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html" source="SUSE-SU"/>
    <description>
    In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-9273/">CVE-2020-9273</cve>
	<bugzilla href="https://bugzilla.suse.com/1164574">SUSE bug 1164574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609973" comment="proftpd-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153640" comment="proftpd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609974" comment="proftpd-devel-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153641" comment="proftpd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609975" comment="proftpd-doc-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153642" comment="proftpd-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609976" comment="proftpd-lang-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153643" comment="proftpd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609977" comment="proftpd-ldap-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153644" comment="proftpd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609978" comment="proftpd-mysql-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153645" comment="proftpd-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609979" comment="proftpd-pgsql-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153646" comment="proftpd-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609980" comment="proftpd-radius-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153647" comment="proftpd-radius is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609981" comment="proftpd-sqlite-1.3.6c-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153648" comment="proftpd-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9383</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607273" comment="kernel-debug-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151957" comment="kernel-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607274" comment="kernel-debug-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151958" comment="kernel-debug-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607275" comment="kernel-debug-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151959" comment="kernel-debug-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607276" comment="kernel-default-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607277" comment="kernel-default-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607278" comment="kernel-default-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151355" comment="kernel-default-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607279" comment="kernel-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151356" comment="kernel-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607280" comment="kernel-docs-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607281" comment="kernel-docs-html-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607282" comment="kernel-kvmsmall-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607283" comment="kernel-kvmsmall-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177720" comment="kernel-kvmsmall-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607284" comment="kernel-kvmsmall-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177721" comment="kernel-kvmsmall-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607285" comment="kernel-macros-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607286" comment="kernel-obs-build-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607287" comment="kernel-obs-qa-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607288" comment="kernel-source-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607289" comment="kernel-source-vanilla-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607290" comment="kernel-syms-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607291" comment="kernel-vanilla-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151975" comment="kernel-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607292" comment="kernel-vanilla-base-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154129" comment="kernel-vanilla-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607293" comment="kernel-vanilla-devel-4.12.14-lp151.28.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151976" comment="kernel-vanilla-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9428</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9428" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9428" ref_url="https://www.suse.com/security/cve/CVE-2020-9428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9428/">CVE-2020-9428</cve>
	<bugzilla href="https://bugzilla.suse.com/1165241">SUSE bug 1165241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9429</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9429" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9429" ref_url="https://www.suse.com/security/cve/CVE-2020-9429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.1, the WireGuard dissector could crash. This was addressed in epan/dissectors/packet-wireguard.c by handling the situation where a certain data structure intentionally has a NULL value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9429/">CVE-2020-9429</cve>
	<bugzilla href="https://bugzilla.suse.com/1165241">SUSE bug 1165241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9430</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9430" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9430" ref_url="https://www.suse.com/security/cve/CVE-2020-9430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the WiMax DLMAP dissector could crash. This was addressed in plugins/epan/wimax/msg_dlmap.c by validating a length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9430/">CVE-2020-9430</cve>
	<bugzilla href="https://bugzilla.suse.com/1165241">SUSE bug 1165241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9431</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9431" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9431" ref_url="https://www.suse.com/security/cve/CVE-2020-9431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9431/">CVE-2020-9431</cve>
	<bugzilla href="https://bugzilla.suse.com/1165241">SUSE bug 1165241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607163" comment="libmaxminddb-devel-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280470" comment="libmaxminddb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607164" comment="libmaxminddb0-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280471" comment="libmaxminddb0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607165" comment="libmaxminddb0-32bit-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280472" comment="libmaxminddb0-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607166" comment="libspandsp2-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280473" comment="libspandsp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607167" comment="libspandsp2-32bit-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280474" comment="libspandsp2-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607168" comment="libwireshark13-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280475" comment="libwireshark13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607169" comment="libwiretap10-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280476" comment="libwiretap10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607170" comment="libwsutil11-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280477" comment="libwsutil11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607171" comment="mmdblookup-1.4.2-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280478" comment="mmdblookup is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607172" comment="spandsp-devel-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280480" comment="spandsp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607173" comment="spandsp-doc-0.0.6-lp151.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280481" comment="spandsp-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607174" comment="wireshark-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607175" comment="wireshark-devel-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009607176" comment="wireshark-ui-qt-3.2.2-lp151.2.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9484</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html" source="SUSE-SU"/>
    <description>
    When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196395">SUSE bug 1196395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608115" comment="tomcat-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608116" comment="tomcat-admin-webapps-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608117" comment="tomcat-docs-webapp-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608118" comment="tomcat-el-3_0-api-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608119" comment="tomcat-embed-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608120" comment="tomcat-javadoc-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608121" comment="tomcat-jsp-2_3-api-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608122" comment="tomcat-jsvc-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608123" comment="tomcat-lib-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608124" comment="tomcat-servlet-4_0-api-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009608125" comment="tomcat-webapps-9.0.35-lp151.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9490</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178074">SUSE bug 1178074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605876" comment="apache2-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605877" comment="apache2-devel-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605878" comment="apache2-doc-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151167" comment="apache2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605879" comment="apache2-event-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605880" comment="apache2-example-pages-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151168" comment="apache2-example-pages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605881" comment="apache2-prefork-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605882" comment="apache2-utils-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009605883" comment="apache2-worker-2.4.33-lp151.8.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9802</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604389" comment="libjavascriptcoregtk-4_0-18-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604390" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604391" comment="libwebkit2gtk-4_0-37-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604392" comment="libwebkit2gtk-4_0-37-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604393" comment="libwebkit2gtk3-lang-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604394" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604395" comment="typelib-1_0-WebKit2-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604396" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604397" comment="webkit-jsc-4-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604398" comment="webkit2gtk-4_0-injected-bundles-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604399" comment="webkit2gtk3-devel-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604400" comment="webkit2gtk3-minibrowser-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9803</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604389" comment="libjavascriptcoregtk-4_0-18-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604390" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604391" comment="libwebkit2gtk-4_0-37-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604392" comment="libwebkit2gtk-4_0-37-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604393" comment="libwebkit2gtk3-lang-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604394" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604395" comment="typelib-1_0-WebKit2-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604396" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604397" comment="webkit-jsc-4-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604398" comment="webkit2gtk-4_0-injected-bundles-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604399" comment="webkit2gtk3-devel-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604400" comment="webkit2gtk3-minibrowser-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9805</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604389" comment="libjavascriptcoregtk-4_0-18-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604390" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604391" comment="libwebkit2gtk-4_0-37-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604392" comment="libwebkit2gtk-4_0-37-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604393" comment="libwebkit2gtk3-lang-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604394" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604395" comment="typelib-1_0-WebKit2-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604396" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604397" comment="webkit-jsc-4-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604398" comment="webkit2gtk-4_0-injected-bundles-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604399" comment="webkit2gtk3-devel-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604400" comment="webkit2gtk3-minibrowser-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9806</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604389" comment="libjavascriptcoregtk-4_0-18-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604390" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604391" comment="libwebkit2gtk-4_0-37-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604392" comment="libwebkit2gtk-4_0-37-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604393" comment="libwebkit2gtk3-lang-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604394" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604395" comment="typelib-1_0-WebKit2-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604396" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604397" comment="webkit-jsc-4-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604398" comment="webkit2gtk-4_0-injected-bundles-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604399" comment="webkit2gtk3-devel-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604400" comment="webkit2gtk3-minibrowser-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9807</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604389" comment="libjavascriptcoregtk-4_0-18-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604390" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604391" comment="libwebkit2gtk-4_0-37-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604392" comment="libwebkit2gtk-4_0-37-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604393" comment="libwebkit2gtk3-lang-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604394" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604395" comment="typelib-1_0-WebKit2-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604396" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604397" comment="webkit-jsc-4-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604398" comment="webkit2gtk-4_0-injected-bundles-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604399" comment="webkit2gtk3-devel-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604400" comment="webkit2gtk3-minibrowser-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9843</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
    <description>
    An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604389" comment="libjavascriptcoregtk-4_0-18-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604390" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604391" comment="libwebkit2gtk-4_0-37-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604392" comment="libwebkit2gtk-4_0-37-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604393" comment="libwebkit2gtk3-lang-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604394" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604395" comment="typelib-1_0-WebKit2-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604396" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604397" comment="webkit-jsc-4-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604398" comment="webkit2gtk-4_0-injected-bundles-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604399" comment="webkit2gtk3-devel-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604400" comment="webkit2gtk3-minibrowser-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9850</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A remote attacker may be able to cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604389" comment="libjavascriptcoregtk-4_0-18-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604390" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604391" comment="libwebkit2gtk-4_0-37-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604392" comment="libwebkit2gtk-4_0-37-32bit-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604393" comment="libwebkit2gtk3-lang-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604394" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604395" comment="typelib-1_0-WebKit2-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604396" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604397" comment="webkit-jsc-4-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604398" comment="webkit2gtk-4_0-injected-bundles-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604399" comment="webkit2gtk3-devel-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604400" comment="webkit2gtk3-minibrowser-2.28.3-lp151.2.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9862</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604941" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604942" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604943" comment="libwebkit2gtk-4_0-37-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604944" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604945" comment="libwebkit2gtk3-lang-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604946" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604947" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604948" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604949" comment="webkit-jsc-4-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604950" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604951" comment="webkit2gtk3-devel-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604952" comment="webkit2gtk3-minibrowser-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9893</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604941" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604942" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604943" comment="libwebkit2gtk-4_0-37-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604944" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604945" comment="libwebkit2gtk3-lang-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604946" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604947" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604948" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604949" comment="webkit-jsc-4-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604950" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604951" comment="webkit2gtk3-devel-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604952" comment="webkit2gtk3-minibrowser-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9894</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604941" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604942" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604943" comment="libwebkit2gtk-4_0-37-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604944" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604945" comment="libwebkit2gtk3-lang-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604946" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604947" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604948" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604949" comment="webkit-jsc-4-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604950" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604951" comment="webkit2gtk3-devel-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604952" comment="webkit2gtk3-minibrowser-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9895</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604941" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604942" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604943" comment="libwebkit2gtk-4_0-37-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604944" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604945" comment="libwebkit2gtk3-lang-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604946" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604947" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604948" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604949" comment="webkit-jsc-4-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604950" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604951" comment="webkit2gtk3-devel-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604952" comment="webkit2gtk3-minibrowser-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9915</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604941" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604942" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604943" comment="libwebkit2gtk-4_0-37-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604944" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604945" comment="libwebkit2gtk3-lang-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604946" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604947" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604948" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604949" comment="webkit-jsc-4-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604950" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604951" comment="webkit2gtk3-devel-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604952" comment="webkit2gtk3-minibrowser-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9925</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604941" comment="libjavascriptcoregtk-4_0-18-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604942" comment="libjavascriptcoregtk-4_0-18-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604943" comment="libwebkit2gtk-4_0-37-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604944" comment="libwebkit2gtk-4_0-37-32bit-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604945" comment="libwebkit2gtk3-lang-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604946" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604947" comment="typelib-1_0-WebKit2-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604948" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604949" comment="webkit-jsc-4-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604950" comment="webkit2gtk-4_0-injected-bundles-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604951" comment="webkit2gtk3-devel-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009604952" comment="webkit2gtk3-minibrowser-2.28.4-lp151.2.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9948</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606852" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606853" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606854" comment="libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606855" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606856" comment="libwebkit2gtk3-lang-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606857" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606858" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606859" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606860" comment="webkit-jsc-4-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606861" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606862" comment="webkit2gtk3-devel-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606863" comment="webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9951</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-22"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606852" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606853" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606854" comment="libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606855" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606856" comment="libwebkit2gtk3-lang-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606857" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606858" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606859" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606860" comment="webkit-jsc-4-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606861" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606862" comment="webkit2gtk3-devel-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606863" comment="webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9983</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606852" comment="libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606853" comment="libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152639" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606854" comment="libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606855" comment="libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152641" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606856" comment="libwebkit2gtk3-lang-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152642" comment="libwebkit2gtk3-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606857" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606858" comment="typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606859" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606860" comment="webkit-jsc-4-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606861" comment="webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606862" comment="webkit2gtk3-devel-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009606863" comment="webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21106</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21106" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21106" ref_url="https://www.suse.com/security/cve/CVE-2021-21106" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in autofill in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21106/">CVE-2021-21106</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21107</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21107" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21107" ref_url="https://www.suse.com/security/cve/CVE-2021-21107" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in drag and drop in Google Chrome on Linux prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21107/">CVE-2021-21107</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21108</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21108" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21108" ref_url="https://www.suse.com/security/cve/CVE-2021-21108" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in media in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21108/">CVE-2021-21108</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21109</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21109" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21109" ref_url="https://www.suse.com/security/cve/CVE-2021-21109" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in payments in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21109/">CVE-2021-21109</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21110</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21110" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21110" ref_url="https://www.suse.com/security/cve/CVE-2021-21110" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21110/">CVE-2021-21110</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21111</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21111" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21111" ref_url="https://www.suse.com/security/cve/CVE-2021-21111" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in WebUI in Google Chrome prior to 87.0.4280.141 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21111/">CVE-2021-21111</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21112</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21112" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21112" ref_url="https://www.suse.com/security/cve/CVE-2021-21112" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21112/">CVE-2021-21112</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21113</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21113" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21113" ref_url="https://www.suse.com/security/cve/CVE-2021-21113" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21113/">CVE-2021-21113</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21114</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21114" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21114" ref_url="https://www.suse.com/security/cve/CVE-2021-21114" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Use after free in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21114/">CVE-2021-21114</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21115</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21115" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21115" ref_url="https://www.suse.com/security/cve/CVE-2021-21115" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    User after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21115/">CVE-2021-21115</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21116</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
            <platform>openSUSE Leap 15.1 NonFree</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21116" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21116" ref_url="https://www.suse.com/security/cve/CVE-2021-21116" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P57LOOIW2OJU7P7J5KL7C2XT5WWY2YT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR5AM5XB3SLX6EFTV6X7ST2RBPHRH4HY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRR7YCDCDGHTWIIOCJQ5NJ4K3G6W7TLQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHBBTXAXJWMTZFXKAXB3FMLMOLA32VFG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOW5ITBZI4UX7TPPGA7TM2EFI3OZCDH7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQPSNTTRO5MNKYMIG7XOBBXCUECNO7J/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21116/">CVE-2021-21116</cve>
	<bugzilla href="https://bugzilla.suse.com/1180645">SUSE bug 1180645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 NonFree is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609438" comment="opera-73.0.3856.344-lp151.2.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229703" comment="opera is signed with openSUSE key"/>
</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609493" comment="chromedriver-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609494" comment="chromium-87.0.4280.141-lp151.2.165.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21117</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21117" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21117" ref_url="https://www.suse.com/security/cve/CVE-2021-21117" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Cryptohome in Google Chrome prior to 88.0.4324.96 allowed a local attacker to perform OS-level privilege escalation via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21117/">CVE-2021-21117</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21118</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21118" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21118" ref_url="https://www.suse.com/security/cve/CVE-2021-21118" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in V8 in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21118/">CVE-2021-21118</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21119</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21119" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21119" ref_url="https://www.suse.com/security/cve/CVE-2021-21119" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Media in Google Chrome prior to 88.0.4324.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21119/">CVE-2021-21119</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21120</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21120" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21120" ref_url="https://www.suse.com/security/cve/CVE-2021-21120" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in WebSQL in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21120/">CVE-2021-21120</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21121</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21121" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21121" ref_url="https://www.suse.com/security/cve/CVE-2021-21121" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Omnibox in Google Chrome on Linux prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21121/">CVE-2021-21121</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21122</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21122" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21122" ref_url="https://www.suse.com/security/cve/CVE-2021-21122" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21122/">CVE-2021-21122</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21123</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21123" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21123" ref_url="https://www.suse.com/security/cve/CVE-2021-21123" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient data validation in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21123/">CVE-2021-21123</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21124</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21124" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21124" ref_url="https://www.suse.com/security/cve/CVE-2021-21124" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Potential user after free in Speech Recognizer in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21124/">CVE-2021-21124</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21125</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21125" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21125" ref_url="https://www.suse.com/security/cve/CVE-2021-21125" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21125/">CVE-2021-21125</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21126</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21126" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21126" ref_url="https://www.suse.com/security/cve/CVE-2021-21126" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21126/">CVE-2021-21126</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21127</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21127" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21127" ref_url="https://www.suse.com/security/cve/CVE-2021-21127" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass content security policy via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21127/">CVE-2021-21127</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21128</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21128" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21128" ref_url="https://www.suse.com/security/cve/CVE-2021-21128" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21128/">CVE-2021-21128</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21129</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21129" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21129" ref_url="https://www.suse.com/security/cve/CVE-2021-21129" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21129/">CVE-2021-21129</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21130</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21130" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21130" ref_url="https://www.suse.com/security/cve/CVE-2021-21130" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21130/">CVE-2021-21130</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21131</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21131" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21131" ref_url="https://www.suse.com/security/cve/CVE-2021-21131" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21131/">CVE-2021-21131</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21132</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21132" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21132" ref_url="https://www.suse.com/security/cve/CVE-2021-21132" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21132/">CVE-2021-21132</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21133</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21133" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21133" ref_url="https://www.suse.com/security/cve/CVE-2021-21133" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in Downloads in Google Chrome prior to 88.0.4324.96 allowed an attacker who convinced a user to download files to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21133/">CVE-2021-21133</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21134</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21134" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21134" ref_url="https://www.suse.com/security/cve/CVE-2021-21134" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Incorrect security UI in Page Info in Google Chrome on iOS prior to 88.0.4324.96 allowed a remote attacker to spoof security UI via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21134/">CVE-2021-21134</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21135</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21135" ref_url="https://www.suse.com/security/cve/CVE-2021-21135" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in Performance API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21135/">CVE-2021-21135</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21136</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21136" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21136" ref_url="https://www.suse.com/security/cve/CVE-2021-21136" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in WebView in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21136/">CVE-2021-21136</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21137</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21137" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21137" ref_url="https://www.suse.com/security/cve/CVE-2021-21137" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21137/">CVE-2021-21137</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21138</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21138" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21138" ref_url="https://www.suse.com/security/cve/CVE-2021-21138" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Use after free in DevTools in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform a sandbox escape via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21138/">CVE-2021-21138</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21139" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21139" ref_url="https://www.suse.com/security/cve/CVE-2021-21139" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in iframe sandbox in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21139/">CVE-2021-21139</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21140</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21140" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21140" ref_url="https://www.suse.com/security/cve/CVE-2021-21140" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Uninitialized use in USB in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform out of bounds memory access via via a USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21140/">CVE-2021-21140</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21141</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21141" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21141" ref_url="https://www.suse.com/security/cve/CVE-2021-21141" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass file extension policy via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-21141/">CVE-2021-21141</cve>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609463" comment="chromedriver-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609464" comment="chromium-88.0.4324.96-lp151.2.171.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23239</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23239" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
    <description>
    The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239</cve>
	<bugzilla href="https://bugzilla.suse.com/1171722">SUSE bug 1171722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609465" comment="sudo-1.8.22-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609466" comment="sudo-devel-1.8.22-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609467" comment="sudo-test-1.8.22-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23240</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23240" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
    <description>
    selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240</cve>
	<bugzilla href="https://bugzilla.suse.com/1171722">SUSE bug 1171722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609465" comment="sudo-1.8.22-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609466" comment="sudo-devel-1.8.22-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609467" comment="sudo-test-1.8.22-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23953</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609478" comment="MozillaFirefox-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609479" comment="MozillaFirefox-branding-upstream-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609480" comment="MozillaFirefox-buildsymbols-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609481" comment="MozillaFirefox-devel-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609482" comment="MozillaFirefox-translations-common-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609483" comment="MozillaFirefox-translations-other-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609475" comment="MozillaThunderbird-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609476" comment="MozillaThunderbird-translations-common-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609477" comment="MozillaThunderbird-translations-other-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23954</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609478" comment="MozillaFirefox-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609479" comment="MozillaFirefox-branding-upstream-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609480" comment="MozillaFirefox-buildsymbols-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609481" comment="MozillaFirefox-devel-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609482" comment="MozillaFirefox-translations-common-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609483" comment="MozillaFirefox-translations-other-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609475" comment="MozillaThunderbird-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609476" comment="MozillaThunderbird-translations-common-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609477" comment="MozillaThunderbird-translations-other-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23960</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609478" comment="MozillaFirefox-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609479" comment="MozillaFirefox-branding-upstream-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609480" comment="MozillaFirefox-buildsymbols-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609481" comment="MozillaFirefox-devel-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609482" comment="MozillaFirefox-translations-common-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609483" comment="MozillaFirefox-translations-other-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609475" comment="MozillaThunderbird-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609476" comment="MozillaThunderbird-translations-common-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609477" comment="MozillaThunderbird-translations-other-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23964</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609478" comment="MozillaFirefox-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609479" comment="MozillaFirefox-branding-upstream-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609480" comment="MozillaFirefox-buildsymbols-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152807" comment="MozillaFirefox-buildsymbols is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609481" comment="MozillaFirefox-devel-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609482" comment="MozillaFirefox-translations-common-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609483" comment="MozillaFirefox-translations-other-78.7.0-lp151.2.88.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609475" comment="MozillaThunderbird-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609476" comment="MozillaThunderbird-translations-common-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609477" comment="MozillaThunderbird-translations-other-78.7.0-lp151.2.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3114</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3114" ref_url="https://www.suse.com/security/cve/CVE-2021-3114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6AHVSSFZQ2VAOK2PGQ7E4WNIXZEO6OV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLSYUO4X4LW4VZTYIOWDRLII23FZ4LSP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JVN2JM5TB7JXDFH25XPTVDVURPTQ3WB/" source="SUSE-SU"/>
    <description>
    In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3114/">CVE-2021-3114</cve>
	<bugzilla href="https://bugzilla.suse.com/1181145">SUSE bug 1181145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609471" comment="go1.14-1.14.14-lp151.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609472" comment="go1.14-doc-1.14.14-lp151.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609473" comment="go1.14-race-1.14.14-lp151.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3115</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3115" ref_url="https://www.suse.com/security/cve/CVE-2021-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6AHVSSFZQ2VAOK2PGQ7E4WNIXZEO6OV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLSYUO4X4LW4VZTYIOWDRLII23FZ4LSP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JVN2JM5TB7JXDFH25XPTVDVURPTQ3WB/" source="SUSE-SU"/>
    <description>
    Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the "go get" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3115/">CVE-2021-3115</cve>
	<bugzilla href="https://bugzilla.suse.com/1181146">SUSE bug 1181146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609471" comment="go1.14-1.14.14-lp151.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281967" comment="go1.14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609472" comment="go1.14-doc-1.14.14-lp151.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281968" comment="go1.14-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609473" comment="go1.14-race-1.14.14-lp151.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281969" comment="go1.14-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3139</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3139" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3139" ref_url="https://www.suse.com/security/cve/CVE-2021-3139" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008219.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTFH53IA4W7XVWYIQM4NLLAGVV2F4GXC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JYQLRIH544YEAMHU4GAXRYAFN2OW7FVX/" source="SUSE-SU"/>
    <description>
    In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_udev in tcmur_cmd_handler.c lacks a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. NOTE: relative to CVE-2020-28374, this is a similar mistake in a different algorithm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-3139/">CVE-2021-3139</cve>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609431" comment="libtcmu2-1.4.0-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342056" comment="libtcmu2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609432" comment="tcmu-runner-1.4.0-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342057" comment="tcmu-runner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609433" comment="tcmu-runner-handler-rbd-1.4.0-lp151.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342058" comment="tcmu-runner-handler-rbd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3156</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008661.html" source="SUSE-SU"/>
		<reference ref_id="TID000019841" ref_url="https://www.suse.com/support/kb/doc/?id=000019841" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTRDPRKO2NDRVSH5UJJKLBDYJXGUBK6P/" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181506">SUSE bug 1181506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181657">SUSE bug 1181657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609465" comment="sudo-1.8.22-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609466" comment="sudo-devel-1.8.22-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152559" comment="sudo-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609467" comment="sudo-test-1.8.22-lp151.5.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152560" comment="sudo-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3181</title>
    <affected family="unix">
            <platform>openSUSE Leap 15.1</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3181" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008239.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEMZ6Y2RB5555R7MDMITJLHGYX4T65C7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXFLXGSUQPBN7TELGSNJZPFUX7KMTSBT/" source="SUSE-SU"/>
    <description>
    rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181</cve>
	<bugzilla href="https://bugzilla.suse.com/1181221">SUSE bug 1181221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181505">SUSE bug 1181505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.1</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009265831" comment="openSUSE Leap 15.1 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609460" comment="mutt-1.10.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152082" comment="mutt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609461" comment="mutt-doc-1.10.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161283" comment="mutt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009609462" comment="mutt-lang-1.10.1-lp151.2.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161284" comment="mutt-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609614" version="1" comment="cacti is &lt;1.2.11-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152167" version="1" comment="cacti is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609615" version="1" comment="cacti-spine is &lt;1.2.11-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153174" version="1" comment="cacti-spine is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265831" version="1" comment="openSUSE-release is ==15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009068342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603745" version="1" comment="apache2-mod_perl is &lt;2.0.11-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151816" version="1" comment="apache2-mod_perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603746" version="1" comment="apache2-mod_perl-devel is &lt;2.0.11-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009271141" version="1" comment="apache2-mod_perl-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609036" version="1" comment="libpython3_6m1_0 is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177173" version="1" comment="libpython3_6m1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609037" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.10-lp151.6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244052" version="1" comment="libpython3_6m1_0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609038" version="1" comment="python3 is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151916" version="1" comment="python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609039" version="1" comment="python3-32bit is &lt;3.6.10-lp151.6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152171" version="1" comment="python3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609040" version="1" comment="python3-base is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151647" version="1" comment="python3-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609041" version="1" comment="python3-base-32bit is &lt;3.6.10-lp151.6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152172" version="1" comment="python3-base-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609042" version="1" comment="python3-curses is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151917" version="1" comment="python3-curses is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609043" version="1" comment="python3-dbm is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151918" version="1" comment="python3-dbm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609044" version="1" comment="python3-devel is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152173" version="1" comment="python3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609045" version="1" comment="python3-idle is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152176" version="1" comment="python3-idle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609046" version="1" comment="python3-testsuite is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152177" version="1" comment="python3-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609047" version="1" comment="python3-tk is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151919" version="1" comment="python3-tk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609048" version="1" comment="python3-tools is &lt;3.6.10-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152178" version="1" comment="python3-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607294" version="1" comment="libruby2_5-2_5 is &lt;2.5.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260282" version="1" comment="libruby2_5-2_5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607295" version="1" comment="ruby2.5 is &lt;2.5.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260286" version="1" comment="ruby2.5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607296" version="1" comment="ruby2.5-devel is &lt;2.5.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260288" version="1" comment="ruby2.5-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607297" version="1" comment="ruby2.5-devel-extra is &lt;2.5.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260290" version="1" comment="ruby2.5-devel-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607298" version="1" comment="ruby2.5-doc is &lt;2.5.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260292" version="1" comment="ruby2.5-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607299" version="1" comment="ruby2.5-doc-ri is &lt;2.5.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260294" version="1" comment="ruby2.5-doc-ri is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607300" version="1" comment="ruby2.5-stdlib is &lt;2.5.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260296" version="1" comment="ruby2.5-stdlib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606346" version="1" comment="perl-DBI is &lt;1.639-lp151.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009293432" version="1" comment="perl-DBI is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603020" version="1" comment="fish3 is &lt;3.0.0-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265402" version="1" comment="fish3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603021" version="1" comment="fish3-devel is &lt;3.0.0-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265403" version="1" comment="fish3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606086" version="1" comment="apache-commons-httpclient is &lt;3.1-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151783" version="1" comment="apache-commons-httpclient is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606087" version="1" comment="apache-commons-httpclient-demo is &lt;3.1-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298607" version="1" comment="apache-commons-httpclient-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606088" version="1" comment="apache-commons-httpclient-javadoc is &lt;3.1-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298608" version="1" comment="apache-commons-httpclient-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606089" version="1" comment="apache-commons-httpclient-manual is &lt;3.1-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298609" version="1" comment="apache-commons-httpclient-manual is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606347" version="1" comment="wpa_supplicant is &lt;2.9-lp151.5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152145" version="1" comment="wpa_supplicant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606348" version="1" comment="wpa_supplicant-gui is &lt;2.9-lp151.5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152146" version="1" comment="wpa_supplicant-gui is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609616" version="1" comment="arc is &lt;5.21q-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277005" version="1" comment="arc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607974" version="1" comment="imapfilter is &lt;2.6.16-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283658" version="1" comment="imapfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601306" version="1" comment="bzip2 is &lt;1.0.6-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151380" version="1" comment="bzip2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601307" version="1" comment="bzip2-doc is &lt;1.0.6-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253604" version="1" comment="bzip2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601308" version="1" comment="libbz2-1 is &lt;1.0.6-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151382" version="1" comment="libbz2-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601309" version="1" comment="libbz2-1-32bit is &lt;1.0.6-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151383" version="1" comment="libbz2-1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601310" version="1" comment="libbz2-devel is &lt;1.0.6-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151384" version="1" comment="libbz2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601311" version="1" comment="libbz2-devel-32bit is &lt;1.0.6-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253605" version="1" comment="libbz2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607614" version="1" comment="cri-o is &lt;1.17.1-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281964" version="1" comment="cri-o is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607615" version="1" comment="cri-o-kubeadm-criconfig is &lt;1.17.1-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281965" version="1" comment="cri-o-kubeadm-criconfig is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607616" version="1" comment="cri-tools is &lt;1.18.0-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281966" version="1" comment="cri-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607617" version="1" comment="go1.14 is &lt;1.14-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281967" version="1" comment="go1.14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607618" version="1" comment="go1.14-doc is &lt;1.14-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281968" version="1" comment="go1.14-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607619" version="1" comment="go1.14-race is &lt;1.14-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281969" version="1" comment="go1.14-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607620" version="1" comment="kubernetes-apiserver is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281971" version="1" comment="kubernetes-apiserver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607621" version="1" comment="kubernetes-client is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281972" version="1" comment="kubernetes-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607622" version="1" comment="kubernetes-controller-manager is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281973" version="1" comment="kubernetes-controller-manager is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607623" version="1" comment="kubernetes-kubeadm is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281974" version="1" comment="kubernetes-kubeadm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607624" version="1" comment="kubernetes-kubelet-common is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281975" version="1" comment="kubernetes-kubelet-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607625" version="1" comment="kubernetes-kubelet1.17 is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281976" version="1" comment="kubernetes-kubelet1.17 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607626" version="1" comment="kubernetes-kubelet1.18 is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281977" version="1" comment="kubernetes-kubelet1.18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607627" version="1" comment="kubernetes-master is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281978" version="1" comment="kubernetes-master is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607628" version="1" comment="kubernetes-node is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281979" version="1" comment="kubernetes-node is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607629" version="1" comment="kubernetes-proxy is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281980" version="1" comment="kubernetes-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607630" version="1" comment="kubernetes-scheduler is &lt;1.18.0-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281981" version="1" comment="kubernetes-scheduler is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608454" version="1" comment="libexif-devel is &lt;0.6.22-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151729" version="1" comment="libexif-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608455" version="1" comment="libexif-devel-32bit is &lt;0.6.22-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009279253" version="1" comment="libexif-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608456" version="1" comment="libexif12 is &lt;0.6.22-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151730" version="1" comment="libexif12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608457" version="1" comment="libexif12-32bit is &lt;0.6.22-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151731" version="1" comment="libexif12-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604590" version="1" comment="perl-XML-Twig is &lt;3.52-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289040" version="1" comment="perl-XML-Twig is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605393" version="1" comment="jasper is &lt;2.0.14-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151131" version="1" comment="jasper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605394" version="1" comment="libjasper-devel is &lt;2.0.14-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151132" version="1" comment="libjasper-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605395" version="1" comment="libjasper4 is &lt;2.0.14-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177124" version="1" comment="libjasper4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605396" version="1" comment="libjasper4-32bit is &lt;2.0.14-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252842" version="1" comment="libjasper4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601344" version="1" comment="bluez is &lt;5.48-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165944" version="1" comment="bluez is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601345" version="1" comment="bluez-auto-enable-devices is &lt;5.48-lp151.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242424" version="1" comment="bluez-auto-enable-devices is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601346" version="1" comment="bluez-cups is &lt;5.48-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165946" version="1" comment="bluez-cups is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601347" version="1" comment="bluez-devel is &lt;5.48-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165948" version="1" comment="bluez-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601348" version="1" comment="bluez-devel-32bit is &lt;5.48-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165950" version="1" comment="bluez-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601349" version="1" comment="bluez-test is &lt;5.48-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165952" version="1" comment="bluez-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601350" version="1" comment="libbluetooth3 is &lt;5.48-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165954" version="1" comment="libbluetooth3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601351" version="1" comment="libbluetooth3-32bit is &lt;5.48-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165956" version="1" comment="libbluetooth3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603790" version="1" comment="bluez is &lt;5.48-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603791" version="1" comment="bluez-auto-enable-devices is &lt;5.48-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603792" version="1" comment="bluez-cups is &lt;5.48-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603793" version="1" comment="bluez-devel is &lt;5.48-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603794" version="1" comment="bluez-devel-32bit is &lt;5.48-lp151.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603795" version="1" comment="bluez-test is &lt;5.48-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603796" version="1" comment="libbluetooth3 is &lt;5.48-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603797" version="1" comment="libbluetooth3-32bit is &lt;5.48-lp151.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607420" version="1" comment="exiv2 is &lt;0.26-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154125" version="1" comment="exiv2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607421" version="1" comment="exiv2-lang is &lt;0.26-lp151.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154126" version="1" comment="exiv2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607422" version="1" comment="libexiv2-26 is &lt;0.26-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177206" version="1" comment="libexiv2-26 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607423" version="1" comment="libexiv2-26-32bit is &lt;0.26-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230276" version="1" comment="libexiv2-26-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607424" version="1" comment="libexiv2-devel is &lt;0.26-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152552" version="1" comment="libexiv2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607425" version="1" comment="libexiv2-doc is &lt;0.26-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230277" version="1" comment="libexiv2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607332" version="1" comment="ldns is &lt;1.7.0-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280952" version="1" comment="ldns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607333" version="1" comment="ldns-devel is &lt;1.7.0-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280953" version="1" comment="ldns-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607334" version="1" comment="libldns2 is &lt;1.7.0-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280954" version="1" comment="libldns2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607335" version="1" comment="perl-DNS-LDNS is &lt;1.7.0-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280955" version="1" comment="perl-DNS-LDNS is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607336" version="1" comment="python3-ldns is &lt;1.7.0-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280956" version="1" comment="python3-ldns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604418" version="1" comment="knot is &lt;1.6.8-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177609" version="1" comment="knot is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601941" version="1" comment="ledger is &lt;3.1.3-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260280" version="1" comment="ledger is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607530" version="1" comment="mp3gain is &lt;1.6.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281553" version="1" comment="mp3gain is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609617" version="1" comment="hostapd is &lt;2.9-lp151.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166193" version="1" comment="hostapd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607824" version="1" comment="bouncycastle is &lt;1.60-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153068" version="1" comment="bouncycastle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607825" version="1" comment="bouncycastle-javadoc is &lt;1.60-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153069" version="1" comment="bouncycastle-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602474" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177161" version="1" comment="libIlmImf-2_2-23 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602475" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251976" version="1" comment="libIlmImf-2_2-23-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602476" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251977" version="1" comment="libIlmImfUtil-2_2-23 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602477" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251978" version="1" comment="libIlmImfUtil-2_2-23-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602478" version="1" comment="openexr is &lt;2.2.1-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172752" version="1" comment="openexr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602479" version="1" comment="openexr-devel is &lt;2.2.1-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151255" version="1" comment="openexr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602480" version="1" comment="openexr-doc is &lt;2.2.1-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172753" version="1" comment="openexr-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603877" version="1" comment="dnsmasq is &lt;2.78-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152784" version="1" comment="dnsmasq is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603878" version="1" comment="dnsmasq-utils is &lt;2.78-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153255" version="1" comment="dnsmasq-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607692" version="1" comment="git is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151600" version="1" comment="git is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607693" version="1" comment="git-arch is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153608" version="1" comment="git-arch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607694" version="1" comment="git-core is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151601" version="1" comment="git-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607695" version="1" comment="git-credential-gnome-keyring is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153609" version="1" comment="git-credential-gnome-keyring is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607696" version="1" comment="git-credential-libsecret is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178167" version="1" comment="git-credential-libsecret is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607697" version="1" comment="git-cvs is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151602" version="1" comment="git-cvs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607698" version="1" comment="git-daemon is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151603" version="1" comment="git-daemon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607699" version="1" comment="git-doc is &lt;2.26.1-lp151.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153610" version="1" comment="git-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607700" version="1" comment="git-email is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151604" version="1" comment="git-email is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607701" version="1" comment="git-gui is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151605" version="1" comment="git-gui is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607702" version="1" comment="git-p4 is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178168" version="1" comment="git-p4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607703" version="1" comment="git-svn is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151606" version="1" comment="git-svn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607704" version="1" comment="git-web is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151607" version="1" comment="git-web is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607705" version="1" comment="gitk is &lt;2.26.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151608" version="1" comment="gitk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603326" version="1" comment="tcpdump is &lt;4.9.2-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152520" version="1" comment="tcpdump is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609618" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234594" version="1" comment="ffmpeg-4-libavcodec-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609619" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234595" version="1" comment="ffmpeg-4-libavdevice-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609620" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234596" version="1" comment="ffmpeg-4-libavfilter-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609621" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234597" version="1" comment="ffmpeg-4-libavformat-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609622" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234598" version="1" comment="ffmpeg-4-libavresample-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609623" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234599" version="1" comment="ffmpeg-4-libavutil-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609624" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234600" version="1" comment="ffmpeg-4-libpostproc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609625" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234601" version="1" comment="ffmpeg-4-libswresample-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609626" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234602" version="1" comment="ffmpeg-4-libswscale-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609627" version="1" comment="ffmpeg-4-private-devel is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234603" version="1" comment="ffmpeg-4-private-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609628" version="1" comment="libavcodec58 is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234604" version="1" comment="libavcodec58 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510674" version="1" comment="libavcodec58-32bit is &lt;4.2.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234605" version="1" comment="libavcodec58-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609629" version="1" comment="libavdevice58 is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234606" version="1" comment="libavdevice58 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510677" version="1" comment="libavdevice58-32bit is &lt;4.2.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234607" version="1" comment="libavdevice58-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609630" version="1" comment="libavfilter7 is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234608" version="1" comment="libavfilter7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510680" version="1" comment="libavfilter7-32bit is &lt;4.2.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234609" version="1" comment="libavfilter7-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609631" version="1" comment="libavformat58 is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234610" version="1" comment="libavformat58 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510683" version="1" comment="libavformat58-32bit is &lt;4.2.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234611" version="1" comment="libavformat58-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609632" version="1" comment="libavresample4 is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234612" version="1" comment="libavresample4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510686" version="1" comment="libavresample4-32bit is &lt;4.2.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234613" version="1" comment="libavresample4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609633" version="1" comment="libavutil56 is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234614" version="1" comment="libavutil56 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510689" version="1" comment="libavutil56-32bit is &lt;4.2.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234615" version="1" comment="libavutil56-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609634" version="1" comment="libpostproc55 is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234616" version="1" comment="libpostproc55 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510692" version="1" comment="libpostproc55-32bit is &lt;4.2.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234617" version="1" comment="libpostproc55-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609635" version="1" comment="libswresample3 is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234618" version="1" comment="libswresample3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510695" version="1" comment="libswresample3-32bit is &lt;4.2.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234619" version="1" comment="libswresample3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609636" version="1" comment="libswscale5 is &lt;4.2.1-lp151.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234620" version="1" comment="libswscale5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009510698" version="1" comment="libswscale5-32bit is &lt;4.2.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234621" version="1" comment="libswscale5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602825" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152789" version="1" comment="libldap-2_4-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602826" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp151.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152790" version="1" comment="libldap-2_4-2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602827" version="1" comment="libldap-data is &lt;2.4.46-lp151.10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154130" version="1" comment="libldap-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602828" version="1" comment="openldap2 is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152657" version="1" comment="openldap2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602829" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152793" version="1" comment="openldap2-back-meta is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602830" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152794" version="1" comment="openldap2-back-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602831" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162108" version="1" comment="openldap2-back-sock is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602832" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152795" version="1" comment="openldap2-back-sql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602833" version="1" comment="openldap2-client is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152796" version="1" comment="openldap2-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602834" version="1" comment="openldap2-contrib is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162109" version="1" comment="openldap2-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602835" version="1" comment="openldap2-devel is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152797" version="1" comment="openldap2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602836" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp151.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152798" version="1" comment="openldap2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602837" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152799" version="1" comment="openldap2-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602838" version="1" comment="openldap2-doc is &lt;2.4.46-lp151.10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152800" version="1" comment="openldap2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602839" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162110" version="1" comment="openldap2-ppolicy-check-password is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601858" version="1" comment="libruby2_5-2_5 is &lt;2.5.5-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601859" version="1" comment="ruby-bundled-gems-rpmhelper is &lt;0.0.2-lp151.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260284" version="1" comment="ruby-bundled-gems-rpmhelper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601860" version="1" comment="ruby2.5 is &lt;2.5.5-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601861" version="1" comment="ruby2.5-devel is &lt;2.5.5-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601862" version="1" comment="ruby2.5-devel-extra is &lt;2.5.5-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601863" version="1" comment="ruby2.5-doc is &lt;2.5.5-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601864" version="1" comment="ruby2.5-doc-ri is &lt;2.5.5-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601865" version="1" comment="ruby2.5-stdlib is &lt;2.5.5-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609484" version="1" comment="gimp is &lt;2.8.22-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151540" version="1" comment="gimp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609485" version="1" comment="gimp-devel is &lt;2.8.22-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153688" version="1" comment="gimp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609486" version="1" comment="gimp-lang is &lt;2.8.22-lp151.5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151542" version="1" comment="gimp-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609487" version="1" comment="gimp-plugin-aa is &lt;2.8.22-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151543" version="1" comment="gimp-plugin-aa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609488" version="1" comment="gimp-plugins-python is &lt;2.8.22-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151544" version="1" comment="gimp-plugins-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609489" version="1" comment="libgimp-2_0-0 is &lt;2.8.22-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151545" version="1" comment="libgimp-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609490" version="1" comment="libgimp-2_0-0-32bit is &lt;2.8.22-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153689" version="1" comment="libgimp-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609491" version="1" comment="libgimpui-2_0-0 is &lt;2.8.22-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151546" version="1" comment="libgimpui-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609492" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.8.22-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153690" version="1" comment="libgimpui-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606926" version="1" comment="gimp is &lt;2.8.22-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606927" version="1" comment="gimp-devel is &lt;2.8.22-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606928" version="1" comment="gimp-lang is &lt;2.8.22-lp151.5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606929" version="1" comment="gimp-plugin-aa is &lt;2.8.22-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606930" version="1" comment="gimp-plugins-python is &lt;2.8.22-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606931" version="1" comment="libgimp-2_0-0 is &lt;2.8.22-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606932" version="1" comment="libgimp-2_0-0-32bit is &lt;2.8.22-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606933" version="1" comment="libgimpui-2_0-0 is &lt;2.8.22-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606934" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.8.22-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605217" version="1" comment="gimp is &lt;2.8.22-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605218" version="1" comment="gimp-devel is &lt;2.8.22-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605219" version="1" comment="gimp-lang is &lt;2.8.22-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605220" version="1" comment="gimp-plugin-aa is &lt;2.8.22-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605221" version="1" comment="gimp-plugins-python is &lt;2.8.22-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605222" version="1" comment="libgimp-2_0-0 is &lt;2.8.22-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605223" version="1" comment="libgimp-2_0-0-32bit is &lt;2.8.22-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605224" version="1" comment="libgimpui-2_0-0 is &lt;2.8.22-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605225" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.8.22-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602852" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151957" version="1" comment="kernel-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602853" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151958" version="1" comment="kernel-debug-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602854" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151959" version="1" comment="kernel-debug-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602855" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151354" version="1" comment="kernel-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602856" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151960" version="1" comment="kernel-default-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602857" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151355" version="1" comment="kernel-default-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602858" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151356" version="1" comment="kernel-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602859" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151357" version="1" comment="kernel-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602860" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151961" version="1" comment="kernel-docs-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602861" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177719" version="1" comment="kernel-kvmsmall is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602862" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177720" version="1" comment="kernel-kvmsmall-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602863" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177721" version="1" comment="kernel-kvmsmall-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602864" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151358" version="1" comment="kernel-macros is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602865" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151966" version="1" comment="kernel-obs-build is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602866" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151967" version="1" comment="kernel-obs-qa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602867" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151360" version="1" comment="kernel-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602868" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151974" version="1" comment="kernel-source-vanilla is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602869" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151361" version="1" comment="kernel-syms is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602870" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151975" version="1" comment="kernel-vanilla is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602871" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154129" version="1" comment="kernel-vanilla-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602872" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151976" version="1" comment="kernel-vanilla-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603033" version="1" comment="ncat is &lt;7.70-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253372" version="1" comment="ncat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603034" version="1" comment="ndiff is &lt;7.70-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253373" version="1" comment="ndiff is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603035" version="1" comment="nmap is &lt;7.70-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253374" version="1" comment="nmap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603036" version="1" comment="nping is &lt;7.70-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253375" version="1" comment="nping is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603037" version="1" comment="zenmap is &lt;7.70-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253376" version="1" comment="zenmap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603277" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603278" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603279" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603280" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603281" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603282" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603283" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.20.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603284" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.20.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603285" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.20.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603286" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603287" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603288" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603289" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.20.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603290" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603291" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603292" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.20.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603293" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.20.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603294" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603295" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603296" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603297" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609339" version="1" comment="LibVNCServer-devel is &lt;0.9.10-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152205" version="1" comment="LibVNCServer-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609340" version="1" comment="libvncclient0 is &lt;0.9.10-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152206" version="1" comment="libvncclient0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609341" version="1" comment="libvncserver0 is &lt;0.9.10-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152207" version="1" comment="libvncserver0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606174" version="1" comment="libraptor-devel is &lt;2.0.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299308" version="1" comment="libraptor-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606175" version="1" comment="libraptor2-0 is &lt;2.0.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151673" version="1" comment="libraptor2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606176" version="1" comment="libraptor2-0-32bit is &lt;2.0.15-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299309" version="1" comment="libraptor2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606177" version="1" comment="raptor is &lt;2.0.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299310" version="1" comment="raptor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601600" version="1" comment="libnetpbm-devel is &lt;10.80.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153784" version="1" comment="libnetpbm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601601" version="1" comment="libnetpbm11 is &lt;10.80.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153785" version="1" comment="libnetpbm11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601602" version="1" comment="libnetpbm11-32bit is &lt;10.80.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153786" version="1" comment="libnetpbm11-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601603" version="1" comment="netpbm is &lt;10.80.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153787" version="1" comment="netpbm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601604" version="1" comment="netpbm-vulnerable is &lt;10.80.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258192" version="1" comment="netpbm-vulnerable is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605656" version="1" comment="bind is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151203" version="1" comment="bind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605657" version="1" comment="bind-chrootenv is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151204" version="1" comment="bind-chrootenv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605658" version="1" comment="bind-devel is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153102" version="1" comment="bind-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605659" version="1" comment="bind-devel-32bit is &lt;9.16.6-lp151.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256539" version="1" comment="bind-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605660" version="1" comment="bind-doc is &lt;9.16.6-lp151.11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151205" version="1" comment="bind-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605661" version="1" comment="bind-utils is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151207" version="1" comment="bind-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605662" version="1" comment="libbind9-1600 is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296220" version="1" comment="libbind9-1600 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605663" version="1" comment="libbind9-1600-32bit is &lt;9.16.6-lp151.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296221" version="1" comment="libbind9-1600-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605664" version="1" comment="libdns1605 is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296222" version="1" comment="libdns1605 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605665" version="1" comment="libdns1605-32bit is &lt;9.16.6-lp151.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296223" version="1" comment="libdns1605-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605666" version="1" comment="libirs-devel is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256550" version="1" comment="libirs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605667" version="1" comment="libirs1601 is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296224" version="1" comment="libirs1601 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605668" version="1" comment="libirs1601-32bit is &lt;9.16.6-lp151.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296225" version="1" comment="libirs1601-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605669" version="1" comment="libisc1606 is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296226" version="1" comment="libisc1606 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605670" version="1" comment="libisc1606-32bit is &lt;9.16.6-lp151.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296227" version="1" comment="libisc1606-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605671" version="1" comment="libisccc1600 is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296228" version="1" comment="libisccc1600 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605672" version="1" comment="libisccc1600-32bit is &lt;9.16.6-lp151.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296229" version="1" comment="libisccc1600-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605673" version="1" comment="libisccfg1600 is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296230" version="1" comment="libisccfg1600 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605674" version="1" comment="libisccfg1600-32bit is &lt;9.16.6-lp151.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296231" version="1" comment="libisccfg1600-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605675" version="1" comment="libns1604 is &lt;9.16.6-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296232" version="1" comment="libns1604 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605676" version="1" comment="libns1604-32bit is &lt;9.16.6-lp151.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296233" version="1" comment="libns1604-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605677" version="1" comment="libuv-devel is &lt;1.18.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296235" version="1" comment="libuv-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605678" version="1" comment="libuv1 is &lt;1.18.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296236" version="1" comment="libuv1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605679" version="1" comment="libuv1-32bit is &lt;1.18.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296237" version="1" comment="libuv1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605680" version="1" comment="python3-bind is &lt;9.16.6-lp151.11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177148" version="1" comment="python3-bind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605681" version="1" comment="sysuser-shadow is &lt;2.0-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296238" version="1" comment="sysuser-shadow is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605682" version="1" comment="sysuser-tools is &lt;2.0-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296239" version="1" comment="sysuser-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609637" version="1" comment="proftpd is &lt;1.3.6b-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153640" version="1" comment="proftpd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609638" version="1" comment="proftpd-devel is &lt;1.3.6b-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153641" version="1" comment="proftpd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609639" version="1" comment="proftpd-doc is &lt;1.3.6b-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153642" version="1" comment="proftpd-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609640" version="1" comment="proftpd-lang is &lt;1.3.6b-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153643" version="1" comment="proftpd-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609641" version="1" comment="proftpd-ldap is &lt;1.3.6b-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153644" version="1" comment="proftpd-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609642" version="1" comment="proftpd-mysql is &lt;1.3.6b-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153645" version="1" comment="proftpd-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609643" version="1" comment="proftpd-pgsql is &lt;1.3.6b-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153646" version="1" comment="proftpd-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609644" version="1" comment="proftpd-radius is &lt;1.3.6b-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153647" version="1" comment="proftpd-radius is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609645" version="1" comment="proftpd-sqlite is &lt;1.3.6b-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153648" version="1" comment="proftpd-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601563" version="1" comment="elfutils is &lt;0.168-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152057" version="1" comment="elfutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601564" version="1" comment="elfutils-lang is &lt;0.168-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177194" version="1" comment="elfutils-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601565" version="1" comment="libasm-devel is &lt;0.168-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257556" version="1" comment="libasm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601566" version="1" comment="libasm1 is &lt;0.168-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152058" version="1" comment="libasm1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601567" version="1" comment="libasm1-32bit is &lt;0.168-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257559" version="1" comment="libasm1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601568" version="1" comment="libdw-devel is &lt;0.168-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257561" version="1" comment="libdw-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601569" version="1" comment="libdw1 is &lt;0.168-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152059" version="1" comment="libdw1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601570" version="1" comment="libdw1-32bit is &lt;0.168-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177195" version="1" comment="libdw1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601571" version="1" comment="libebl-devel is &lt;0.168-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257565" version="1" comment="libebl-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601572" version="1" comment="libebl-plugins is &lt;0.168-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177196" version="1" comment="libebl-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601573" version="1" comment="libebl-plugins-32bit is &lt;0.168-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177197" version="1" comment="libebl-plugins-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601574" version="1" comment="libelf-devel is &lt;0.168-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257569" version="1" comment="libelf-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601575" version="1" comment="libelf-devel-32bit is &lt;0.168-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257571" version="1" comment="libelf-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601576" version="1" comment="libelf1 is &lt;0.168-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152060" version="1" comment="libelf1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601577" version="1" comment="libelf1-32bit is &lt;0.168-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152061" version="1" comment="libelf1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608264" version="1" comment="libcroco is &lt;0.6.12-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257312" version="1" comment="libcroco is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608265" version="1" comment="libcroco-0_6-3 is &lt;0.6.12-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177260" version="1" comment="libcroco-0_6-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608266" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.12-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177261" version="1" comment="libcroco-0_6-3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608267" version="1" comment="libcroco-devel is &lt;0.6.12-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257313" version="1" comment="libcroco-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608836" version="1" comment="adns is &lt;1.5.1-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285802" version="1" comment="adns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608837" version="1" comment="libadns-devel is &lt;1.5.1-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285803" version="1" comment="libadns-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608838" version="1" comment="libadns-devel-32bit is &lt;1.5.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285804" version="1" comment="libadns-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608839" version="1" comment="libadns1 is &lt;1.5.1-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285805" version="1" comment="libadns1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608840" version="1" comment="libadns1-32bit is &lt;1.5.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285806" version="1" comment="libadns1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602024" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602025" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602026" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602027" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602028" version="1" comment="openexr is &lt;2.2.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602029" version="1" comment="openexr-devel is &lt;2.2.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602030" version="1" comment="openexr-doc is &lt;2.2.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604343" version="1" comment="cairo-devel is &lt;1.16.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158149" version="1" comment="cairo-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604344" version="1" comment="cairo-devel-32bit is &lt;1.16.0-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158150" version="1" comment="cairo-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604345" version="1" comment="cairo-tools is &lt;1.16.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158151" version="1" comment="cairo-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604346" version="1" comment="libcairo-gobject2 is &lt;1.16.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158152" version="1" comment="libcairo-gobject2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604347" version="1" comment="libcairo-gobject2-32bit is &lt;1.16.0-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158153" version="1" comment="libcairo-gobject2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604348" version="1" comment="libcairo-script-interpreter2 is &lt;1.16.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158154" version="1" comment="libcairo-script-interpreter2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604349" version="1" comment="libcairo-script-interpreter2-32bit is &lt;1.16.0-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158155" version="1" comment="libcairo-script-interpreter2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604350" version="1" comment="libcairo2 is &lt;1.16.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158156" version="1" comment="libcairo2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604351" version="1" comment="libcairo2-32bit is &lt;1.16.0-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158157" version="1" comment="libcairo2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602008" version="1" comment="python3-virtualbox is &lt;6.0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231803" version="1" comment="python3-virtualbox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602009" version="1" comment="virtualbox is &lt;6.0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152062" version="1" comment="virtualbox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602010" version="1" comment="virtualbox-devel is &lt;6.0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153267" version="1" comment="virtualbox-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602011" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.0.10-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153268" version="1" comment="virtualbox-guest-desktop-icons is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602012" version="1" comment="virtualbox-guest-kmp-default is &lt;6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152063" version="1" comment="virtualbox-guest-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602013" version="1" comment="virtualbox-guest-source is &lt;6.0.10-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166864" version="1" comment="virtualbox-guest-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602014" version="1" comment="virtualbox-guest-tools is &lt;6.0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152064" version="1" comment="virtualbox-guest-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602015" version="1" comment="virtualbox-guest-x11 is &lt;6.0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152065" version="1" comment="virtualbox-guest-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602016" version="1" comment="virtualbox-host-kmp-default is &lt;6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152066" version="1" comment="virtualbox-host-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602017" version="1" comment="virtualbox-host-source is &lt;6.0.10-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153269" version="1" comment="virtualbox-host-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602018" version="1" comment="virtualbox-qt is &lt;6.0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152067" version="1" comment="virtualbox-qt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602019" version="1" comment="virtualbox-vnc is &lt;6.0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166871" version="1" comment="virtualbox-vnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602020" version="1" comment="virtualbox-websrv is &lt;6.0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153270" version="1" comment="virtualbox-websrv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608548" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608549" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608550" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608551" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608552" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608553" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608554" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608555" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.52.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608556" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.52.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608557" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608558" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608559" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608560" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608561" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.52.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608562" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.52.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608563" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608564" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608565" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608566" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608567" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608568" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603251" version="1" comment="cargo is &lt;1.36.0-lp151.5.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265404" version="1" comment="cargo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603252" version="1" comment="cargo-doc is &lt;1.36.0-lp151.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265405" version="1" comment="cargo-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603253" version="1" comment="clippy is &lt;1.36.0-lp151.5.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265406" version="1" comment="clippy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603254" version="1" comment="rls is &lt;1.36.0-lp151.5.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265407" version="1" comment="rls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603255" version="1" comment="rust is &lt;1.36.0-lp151.5.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238244" version="1" comment="rust is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603256" version="1" comment="rust-analysis is &lt;1.36.0-lp151.5.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265408" version="1" comment="rust-analysis is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603257" version="1" comment="rust-cbindgen is &lt;0.8.7-lp151.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265409" version="1" comment="rust-cbindgen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603258" version="1" comment="rust-doc is &lt;1.36.0-lp151.5.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238245" version="1" comment="rust-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603259" version="1" comment="rust-gdb is &lt;1.36.0-lp151.5.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238246" version="1" comment="rust-gdb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603260" version="1" comment="rust-src is &lt;1.36.0-lp151.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238247" version="1" comment="rust-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603261" version="1" comment="rust-std-static is &lt;1.36.0-lp151.5.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265410" version="1" comment="rust-std-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603262" version="1" comment="rustfmt is &lt;1.36.0-lp151.5.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265411" version="1" comment="rustfmt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601392" version="1" comment="libtasn1 is &lt;4.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152119" version="1" comment="libtasn1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601393" version="1" comment="libtasn1-6 is &lt;4.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152120" version="1" comment="libtasn1-6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601394" version="1" comment="libtasn1-6-32bit is &lt;4.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152121" version="1" comment="libtasn1-6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601395" version="1" comment="libtasn1-devel is &lt;4.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152122" version="1" comment="libtasn1-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601396" version="1" comment="libtasn1-devel-32bit is &lt;4.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152787" version="1" comment="libtasn1-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609190" version="1" comment="nasm is &lt;2.14.02-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161694" version="1" comment="nasm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603399" version="1" comment="binutils is &lt;2.32-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152512" version="1" comment="binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603400" version="1" comment="binutils-devel is &lt;2.32-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152513" version="1" comment="binutils-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603401" version="1" comment="binutils-devel-32bit is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167590" version="1" comment="binutils-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603402" version="1" comment="binutils-gold is &lt;2.32-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167592" version="1" comment="binutils-gold is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603403" version="1" comment="cross-aarch64-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167594" version="1" comment="cross-aarch64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603404" version="1" comment="cross-arm-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167596" version="1" comment="cross-arm-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603405" version="1" comment="cross-avr-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167598" version="1" comment="cross-avr-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603406" version="1" comment="cross-epiphany-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238034" version="1" comment="cross-epiphany-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603407" version="1" comment="cross-hppa-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167600" version="1" comment="cross-hppa-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603408" version="1" comment="cross-hppa64-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167602" version="1" comment="cross-hppa64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603409" version="1" comment="cross-i386-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167604" version="1" comment="cross-i386-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603410" version="1" comment="cross-ia64-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167606" version="1" comment="cross-ia64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603411" version="1" comment="cross-m68k-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167608" version="1" comment="cross-m68k-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603412" version="1" comment="cross-mips-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167610" version="1" comment="cross-mips-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603413" version="1" comment="cross-ppc-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167612" version="1" comment="cross-ppc-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603414" version="1" comment="cross-ppc64-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167614" version="1" comment="cross-ppc64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603415" version="1" comment="cross-ppc64le-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167616" version="1" comment="cross-ppc64le-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603416" version="1" comment="cross-riscv64-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238035" version="1" comment="cross-riscv64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603417" version="1" comment="cross-rx-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238036" version="1" comment="cross-rx-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603418" version="1" comment="cross-s390-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167618" version="1" comment="cross-s390-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603419" version="1" comment="cross-s390x-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167620" version="1" comment="cross-s390x-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603420" version="1" comment="cross-sparc-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167622" version="1" comment="cross-sparc-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603421" version="1" comment="cross-sparc64-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167624" version="1" comment="cross-sparc64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603422" version="1" comment="cross-spu-binutils is &lt;2.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167626" version="1" comment="cross-spu-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603860" version="1" comment="bsdtar is &lt;3.3.2-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151800" version="1" comment="bsdtar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603861" version="1" comment="libarchive-devel is &lt;3.3.2-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151801" version="1" comment="libarchive-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603862" version="1" comment="libarchive13 is &lt;3.3.2-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151802" version="1" comment="libarchive13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603863" version="1" comment="libarchive13-32bit is &lt;3.3.2-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152672" version="1" comment="libarchive13-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605017" version="1" comment="graphviz is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167847" version="1" comment="graphviz is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605018" version="1" comment="graphviz-devel is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167849" version="1" comment="graphviz-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605019" version="1" comment="graphviz-doc is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167851" version="1" comment="graphviz-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605020" version="1" comment="graphviz-gd is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167853" version="1" comment="graphviz-gd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605021" version="1" comment="graphviz-gnome is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167855" version="1" comment="graphviz-gnome is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605022" version="1" comment="graphviz-guile is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167857" version="1" comment="graphviz-guile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605023" version="1" comment="graphviz-gvedit is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167859" version="1" comment="graphviz-gvedit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605024" version="1" comment="graphviz-java is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167861" version="1" comment="graphviz-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605025" version="1" comment="graphviz-lua is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167863" version="1" comment="graphviz-lua is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605026" version="1" comment="graphviz-perl is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167865" version="1" comment="graphviz-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605027" version="1" comment="graphviz-php is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167867" version="1" comment="graphviz-php is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605028" version="1" comment="graphviz-plugins-core is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254560" version="1" comment="graphviz-plugins-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605029" version="1" comment="graphviz-python is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167871" version="1" comment="graphviz-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605030" version="1" comment="graphviz-ruby is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167873" version="1" comment="graphviz-ruby is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605031" version="1" comment="graphviz-smyrna is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167875" version="1" comment="graphviz-smyrna is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605032" version="1" comment="graphviz-tcl is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167877" version="1" comment="graphviz-tcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605033" version="1" comment="libgraphviz6 is &lt;2.40.1-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254561" version="1" comment="libgraphviz6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609456" version="1" comment="libwavpack1 is &lt;5.4.0-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172747" version="1" comment="libwavpack1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609457" version="1" comment="libwavpack1-32bit is &lt;5.4.0-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172748" version="1" comment="libwavpack1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609458" version="1" comment="wavpack is &lt;5.4.0-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172749" version="1" comment="wavpack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609459" version="1" comment="wavpack-devel is &lt;5.4.0-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172750" version="1" comment="wavpack-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603817" version="1" comment="strongswan is &lt;5.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153116" version="1" comment="strongswan is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603818" version="1" comment="strongswan-doc is &lt;5.6.0-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153117" version="1" comment="strongswan-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603819" version="1" comment="strongswan-hmac is &lt;5.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153118" version="1" comment="strongswan-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603820" version="1" comment="strongswan-ipsec is &lt;5.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153119" version="1" comment="strongswan-ipsec is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603821" version="1" comment="strongswan-libs0 is &lt;5.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153120" version="1" comment="strongswan-libs0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603822" version="1" comment="strongswan-mysql is &lt;5.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153121" version="1" comment="strongswan-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603823" version="1" comment="strongswan-nm is &lt;5.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153122" version="1" comment="strongswan-nm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603824" version="1" comment="strongswan-sqlite is &lt;5.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153123" version="1" comment="strongswan-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608432" version="1" comment="glusterfs is &lt;3.12.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276150" version="1" comment="glusterfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608433" version="1" comment="glusterfs-devel is &lt;3.12.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276151" version="1" comment="glusterfs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608434" version="1" comment="libgfapi0 is &lt;3.12.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276152" version="1" comment="libgfapi0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608435" version="1" comment="libgfchangelog0 is &lt;3.12.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276153" version="1" comment="libgfchangelog0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608436" version="1" comment="libgfdb0 is &lt;3.12.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276154" version="1" comment="libgfdb0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608437" version="1" comment="libgfrpc0 is &lt;3.12.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276155" version="1" comment="libgfrpc0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608438" version="1" comment="libgfxdr0 is &lt;3.12.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276156" version="1" comment="libgfxdr0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608439" version="1" comment="libglusterfs0 is &lt;3.12.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276157" version="1" comment="libglusterfs0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608440" version="1" comment="python-gluster is &lt;3.12.15-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276158" version="1" comment="python-gluster is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608077" version="1" comment="ant is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151811" version="1" comment="ant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608078" version="1" comment="ant-antlr is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235582" version="1" comment="ant-antlr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608079" version="1" comment="ant-apache-bcel is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235583" version="1" comment="ant-apache-bcel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608080" version="1" comment="ant-apache-bsf is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235584" version="1" comment="ant-apache-bsf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608081" version="1" comment="ant-apache-log4j is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235585" version="1" comment="ant-apache-log4j is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608082" version="1" comment="ant-apache-oro is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235586" version="1" comment="ant-apache-oro is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608083" version="1" comment="ant-apache-regexp is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235587" version="1" comment="ant-apache-regexp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608084" version="1" comment="ant-apache-resolver is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235588" version="1" comment="ant-apache-resolver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608085" version="1" comment="ant-apache-xalan2 is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235589" version="1" comment="ant-apache-xalan2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608086" version="1" comment="ant-commons-logging is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235590" version="1" comment="ant-commons-logging is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608087" version="1" comment="ant-commons-net is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235591" version="1" comment="ant-commons-net is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608088" version="1" comment="ant-javamail is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235592" version="1" comment="ant-javamail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608089" version="1" comment="ant-jdepend is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235593" version="1" comment="ant-jdepend is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608090" version="1" comment="ant-jmf is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151812" version="1" comment="ant-jmf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608091" version="1" comment="ant-jsch is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235594" version="1" comment="ant-jsch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608092" version="1" comment="ant-junit is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151813" version="1" comment="ant-junit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608093" version="1" comment="ant-manual is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235595" version="1" comment="ant-manual is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608094" version="1" comment="ant-scripts is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151814" version="1" comment="ant-scripts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608095" version="1" comment="ant-swing is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151815" version="1" comment="ant-swing is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608096" version="1" comment="ant-testutil is &lt;1.9.10-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235596" version="1" comment="ant-testutil is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602528" version="1" comment="containerd is &lt;1.2.6-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153864" version="1" comment="containerd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602529" version="1" comment="containerd-ctr is &lt;1.2.6-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153865" version="1" comment="containerd-ctr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602530" version="1" comment="docker is &lt;19.03.1_ce-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152505" version="1" comment="docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602531" version="1" comment="docker-bash-completion is &lt;19.03.1_ce-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152506" version="1" comment="docker-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602532" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171077" version="1" comment="docker-libnetwork is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602533" version="1" comment="docker-runc is &lt;1.0.0rc8+gitr3826_425e105d5a03-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171078" version="1" comment="docker-runc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602534" version="1" comment="docker-test is &lt;19.03.1_ce-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152507" version="1" comment="docker-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602535" version="1" comment="docker-zsh-completion is &lt;19.03.1_ce-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152508" version="1" comment="docker-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602536" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171080" version="1" comment="golang-github-docker-libnetwork is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604860" version="1" comment="libecpg6 is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151069" version="1" comment="libecpg6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604861" version="1" comment="libpq5 is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151071" version="1" comment="libpq5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604862" version="1" comment="postgresql is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177236" version="1" comment="postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604863" version="1" comment="postgresql-contrib is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289717" version="1" comment="postgresql-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604864" version="1" comment="postgresql-devel is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289718" version="1" comment="postgresql-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604865" version="1" comment="postgresql-docs is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289719" version="1" comment="postgresql-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604866" version="1" comment="postgresql-llvmjit is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289720" version="1" comment="postgresql-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604867" version="1" comment="postgresql-plperl is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289721" version="1" comment="postgresql-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604868" version="1" comment="postgresql-plpython is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289722" version="1" comment="postgresql-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604869" version="1" comment="postgresql-pltcl is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289723" version="1" comment="postgresql-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604870" version="1" comment="postgresql-server is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177237" version="1" comment="postgresql-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604871" version="1" comment="postgresql-server-devel is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289724" version="1" comment="postgresql-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604872" version="1" comment="postgresql-test is &lt;12.0.1-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289725" version="1" comment="postgresql-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604873" version="1" comment="postgresql10 is &lt;10.13-lp151.2.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177238" version="1" comment="postgresql10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604874" version="1" comment="postgresql10-contrib is &lt;10.13-lp151.2.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233996" version="1" comment="postgresql10-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604875" version="1" comment="postgresql10-devel is &lt;10.13-lp151.2.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233997" version="1" comment="postgresql10-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604876" version="1" comment="postgresql10-docs is &lt;10.13-lp151.2.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233998" version="1" comment="postgresql10-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604877" version="1" comment="postgresql10-plperl is &lt;10.13-lp151.2.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233999" version="1" comment="postgresql10-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604878" version="1" comment="postgresql10-plpython is &lt;10.13-lp151.2.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234000" version="1" comment="postgresql10-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604879" version="1" comment="postgresql10-pltcl is &lt;10.13-lp151.2.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234001" version="1" comment="postgresql10-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604880" version="1" comment="postgresql10-server is &lt;10.13-lp151.2.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177239" version="1" comment="postgresql10-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604881" version="1" comment="postgresql10-test is &lt;10.13-lp151.2.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234002" version="1" comment="postgresql10-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604882" version="1" comment="postgresql12 is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289726" version="1" comment="postgresql12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604883" version="1" comment="postgresql12-contrib is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289727" version="1" comment="postgresql12-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604884" version="1" comment="postgresql12-devel is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289728" version="1" comment="postgresql12-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604885" version="1" comment="postgresql12-docs is &lt;12.3-lp151.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289729" version="1" comment="postgresql12-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604886" version="1" comment="postgresql12-llvmjit is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289730" version="1" comment="postgresql12-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604887" version="1" comment="postgresql12-plperl is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289731" version="1" comment="postgresql12-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604888" version="1" comment="postgresql12-plpython is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289732" version="1" comment="postgresql12-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604889" version="1" comment="postgresql12-pltcl is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289733" version="1" comment="postgresql12-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604890" version="1" comment="postgresql12-server is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289734" version="1" comment="postgresql12-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604891" version="1" comment="postgresql12-server-devel is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289735" version="1" comment="postgresql12-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604892" version="1" comment="postgresql12-test is &lt;12.3-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289736" version="1" comment="postgresql12-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604893" version="1" comment="postgresql96 is &lt;9.6.19-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161265" version="1" comment="postgresql96 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604894" version="1" comment="postgresql96-contrib is &lt;9.6.19-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161266" version="1" comment="postgresql96-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604895" version="1" comment="postgresql96-devel is &lt;9.6.19-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161267" version="1" comment="postgresql96-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604896" version="1" comment="postgresql96-docs is &lt;9.6.19-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161268" version="1" comment="postgresql96-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604897" version="1" comment="postgresql96-plperl is &lt;9.6.19-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163501" version="1" comment="postgresql96-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604898" version="1" comment="postgresql96-plpython is &lt;9.6.19-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163503" version="1" comment="postgresql96-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604899" version="1" comment="postgresql96-pltcl is &lt;9.6.19-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163505" version="1" comment="postgresql96-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604900" version="1" comment="postgresql96-server is &lt;9.6.19-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161269" version="1" comment="postgresql96-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604901" version="1" comment="postgresql96-test is &lt;9.6.19-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163508" version="1" comment="postgresql96-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603360" version="1" comment="libprocps7 is &lt;3.3.15-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268885" version="1" comment="libprocps7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603361" version="1" comment="procps is &lt;3.3.15-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229657" version="1" comment="procps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603362" version="1" comment="procps-devel is &lt;3.3.15-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229658" version="1" comment="procps-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605497" version="1" comment="libucl1 is &lt;1.03-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277404" version="1" comment="libucl1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605498" version="1" comment="ucl-devel is &lt;1.03-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277406" version="1" comment="ucl-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605500" version="1" comment="upx is &lt;3.96-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165780" version="1" comment="upx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607163" version="1" comment="libmaxminddb-devel is &lt;1.4.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280470" version="1" comment="libmaxminddb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607164" version="1" comment="libmaxminddb0 is &lt;1.4.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280471" version="1" comment="libmaxminddb0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607165" version="1" comment="libmaxminddb0-32bit is &lt;1.4.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280472" version="1" comment="libmaxminddb0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607166" version="1" comment="libspandsp2 is &lt;0.0.6-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280473" version="1" comment="libspandsp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607167" version="1" comment="libspandsp2-32bit is &lt;0.0.6-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280474" version="1" comment="libspandsp2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607168" version="1" comment="libwireshark13 is &lt;3.2.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280475" version="1" comment="libwireshark13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607169" version="1" comment="libwiretap10 is &lt;3.2.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280476" version="1" comment="libwiretap10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607170" version="1" comment="libwsutil11 is &lt;3.2.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280477" version="1" comment="libwsutil11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607171" version="1" comment="mmdblookup is &lt;1.4.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280478" version="1" comment="mmdblookup is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607172" version="1" comment="spandsp-devel is &lt;0.0.6-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280480" version="1" comment="spandsp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607173" version="1" comment="spandsp-doc is &lt;0.0.6-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280481" version="1" comment="spandsp-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607174" version="1" comment="wireshark is &lt;3.2.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151250" version="1" comment="wireshark is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607175" version="1" comment="wireshark-devel is &lt;3.2.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153033" version="1" comment="wireshark-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607176" version="1" comment="wireshark-ui-qt is &lt;3.2.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153034" version="1" comment="wireshark-ui-qt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603311" version="1" comment="epiphany is &lt;3.28.1.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268135" version="1" comment="epiphany is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603312" version="1" comment="epiphany-branding-upstream is &lt;3.28.1.1-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268137" version="1" comment="epiphany-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603313" version="1" comment="epiphany-lang is &lt;3.28.1.1-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268139" version="1" comment="epiphany-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603314" version="1" comment="gnome-shell-search-provider-epiphany is &lt;3.28.1.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268141" version="1" comment="gnome-shell-search-provider-epiphany is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601970" version="1" comment="libsass-3_6_1-1 is &lt;3.6.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260549" version="1" comment="libsass-3_6_1-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601971" version="1" comment="libsass-devel is &lt;3.6.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166594" version="1" comment="libsass-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602090" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152695" version="1" comment="libsvn_auth_gnome_keyring-1-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602091" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152696" version="1" comment="libsvn_auth_kwallet-1-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602092" version="1" comment="subversion is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151320" version="1" comment="subversion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602093" version="1" comment="subversion-bash-completion is &lt;1.10.6-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152697" version="1" comment="subversion-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602094" version="1" comment="subversion-devel is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151321" version="1" comment="subversion-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602095" version="1" comment="subversion-perl is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151322" version="1" comment="subversion-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602096" version="1" comment="subversion-python is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151323" version="1" comment="subversion-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602097" version="1" comment="subversion-python-ctypes is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154271" version="1" comment="subversion-python-ctypes is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602098" version="1" comment="subversion-ruby is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152698" version="1" comment="subversion-ruby is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602099" version="1" comment="subversion-server is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151324" version="1" comment="subversion-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602100" version="1" comment="subversion-tools is &lt;1.10.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151325" version="1" comment="subversion-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607338" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261407" version="1" comment="perl-Mail-SpamAssassin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607339" version="1" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is &lt;2.05-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261408" version="1" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607340" version="1" comment="spamassassin is &lt;3.4.2-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261409" version="1" comment="spamassassin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601989" version="1" comment="ucode-intel is &lt;20190618-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169251" version="1" comment="ucode-intel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609646" version="1" comment="xen is &lt;4.12.1_02-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151587" version="1" comment="xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609647" version="1" comment="xen-devel is &lt;4.12.1_02-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151929" version="1" comment="xen-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609648" version="1" comment="xen-doc-html is &lt;4.12.1_02-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151588" version="1" comment="xen-doc-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609649" version="1" comment="xen-libs is &lt;4.12.1_02-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151590" version="1" comment="xen-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609650" version="1" comment="xen-libs-32bit is &lt;4.12.1_02-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151930" version="1" comment="xen-libs-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609651" version="1" comment="xen-tools is &lt;4.12.1_02-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151591" version="1" comment="xen-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609652" version="1" comment="xen-tools-domU is &lt;4.12.1_02-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151592" version="1" comment="xen-tools-domU is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603643" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603644" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603645" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603646" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603647" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603648" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603649" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603650" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603651" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603652" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603653" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603654" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603655" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603656" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603657" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603658" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603659" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603660" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603661" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603662" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603663" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603672" version="1" comment="qemu is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151104" version="1" comment="qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603673" version="1" comment="qemu-arm is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151105" version="1" comment="qemu-arm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603674" version="1" comment="qemu-audio-alsa is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266837" version="1" comment="qemu-audio-alsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603675" version="1" comment="qemu-audio-oss is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266838" version="1" comment="qemu-audio-oss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603676" version="1" comment="qemu-audio-pa is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266839" version="1" comment="qemu-audio-pa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603677" version="1" comment="qemu-audio-sdl is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266840" version="1" comment="qemu-audio-sdl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603678" version="1" comment="qemu-block-curl is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151106" version="1" comment="qemu-block-curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603679" version="1" comment="qemu-block-dmg is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154081" version="1" comment="qemu-block-dmg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603680" version="1" comment="qemu-block-gluster is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223339" version="1" comment="qemu-block-gluster is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603681" version="1" comment="qemu-block-iscsi is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154082" version="1" comment="qemu-block-iscsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603682" version="1" comment="qemu-block-nfs is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266841" version="1" comment="qemu-block-nfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603683" version="1" comment="qemu-block-rbd is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151107" version="1" comment="qemu-block-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603684" version="1" comment="qemu-block-ssh is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154083" version="1" comment="qemu-block-ssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603685" version="1" comment="qemu-extra is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151108" version="1" comment="qemu-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603686" version="1" comment="qemu-guest-agent is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153019" version="1" comment="qemu-guest-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603687" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp151.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151109" version="1" comment="qemu-ipxe is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603688" version="1" comment="qemu-ksm is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161270" version="1" comment="qemu-ksm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603689" version="1" comment="qemu-kvm is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151110" version="1" comment="qemu-kvm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603690" version="1" comment="qemu-lang is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151111" version="1" comment="qemu-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603691" version="1" comment="qemu-linux-user is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151112" version="1" comment="qemu-linux-user is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603692" version="1" comment="qemu-ppc is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151113" version="1" comment="qemu-ppc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603693" version="1" comment="qemu-s390 is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151114" version="1" comment="qemu-s390 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603694" version="1" comment="qemu-seabios is &lt;1.12.0-lp151.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151115" version="1" comment="qemu-seabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603695" version="1" comment="qemu-sgabios is &lt;8-lp151.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151116" version="1" comment="qemu-sgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603696" version="1" comment="qemu-tools is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151117" version="1" comment="qemu-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603697" version="1" comment="qemu-ui-curses is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266842" version="1" comment="qemu-ui-curses is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603698" version="1" comment="qemu-ui-gtk is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266843" version="1" comment="qemu-ui-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603699" version="1" comment="qemu-ui-sdl is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266844" version="1" comment="qemu-ui-sdl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603700" version="1" comment="qemu-vgabios is &lt;1.12.0-lp151.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151118" version="1" comment="qemu-vgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603701" version="1" comment="qemu-x86 is &lt;3.1.1.1-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151119" version="1" comment="qemu-x86 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604342" version="1" comment="spectre-meltdown-checker is &lt;0.43-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275301" version="1" comment="spectre-meltdown-checker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603664" version="1" comment="xen is &lt;4.12.1_04-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603665" version="1" comment="xen-devel is &lt;4.12.1_04-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603666" version="1" comment="xen-doc-html is &lt;4.12.1_04-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603667" version="1" comment="xen-libs is &lt;4.12.1_04-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603668" version="1" comment="xen-libs-32bit is &lt;4.12.1_04-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603669" version="1" comment="xen-tools is &lt;4.12.1_04-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603670" version="1" comment="xen-tools-domU is &lt;4.12.1_04-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601631" version="1" comment="exempi-tools is &lt;2.4.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173302" version="1" comment="exempi-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601632" version="1" comment="libexempi-devel is &lt;2.4.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173303" version="1" comment="libexempi-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601633" version="1" comment="libexempi3 is &lt;2.4.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173304" version="1" comment="libexempi3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601634" version="1" comment="libexempi3-32bit is &lt;2.4.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173305" version="1" comment="libexempi3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607477" version="1" comment="nagios is &lt;4.4.5-lp151.5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151576" version="1" comment="nagios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607478" version="1" comment="nagios-contrib is &lt;4.4.5-lp151.5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281477" version="1" comment="nagios-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607479" version="1" comment="nagios-devel is &lt;4.4.5-lp151.5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281478" version="1" comment="nagios-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607480" version="1" comment="nagios-theme-exfoliation is &lt;4.4.5-lp151.5.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281479" version="1" comment="nagios-theme-exfoliation is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607481" version="1" comment="nagios-www is &lt;4.4.5-lp151.5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151577" version="1" comment="nagios-www is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607482" version="1" comment="nagios-www-dch is &lt;4.4.5-lp151.5.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281480" version="1" comment="nagios-www-dch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601411" version="1" comment="libpng16-16 is &lt;1.6.34-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151414" version="1" comment="libpng16-16 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601412" version="1" comment="libpng16-16-32bit is &lt;1.6.34-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151415" version="1" comment="libpng16-16-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601413" version="1" comment="libpng16-compat-devel is &lt;1.6.34-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151416" version="1" comment="libpng16-compat-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601414" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.34-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153135" version="1" comment="libpng16-compat-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601415" version="1" comment="libpng16-devel is &lt;1.6.34-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151417" version="1" comment="libpng16-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601416" version="1" comment="libpng16-devel-32bit is &lt;1.6.34-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153136" version="1" comment="libpng16-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601417" version="1" comment="libpng16-tools is &lt;1.6.34-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153137" version="1" comment="libpng16-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609653" version="1" comment="clementine is &lt;1.3.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260298" version="1" comment="clementine is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607038" version="1" comment="gd is &lt;2.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152100" version="1" comment="gd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607039" version="1" comment="gd-devel is &lt;2.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153569" version="1" comment="gd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607040" version="1" comment="libgd3 is &lt;2.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177199" version="1" comment="libgd3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607041" version="1" comment="libgd3-32bit is &lt;2.2.5-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235644" version="1" comment="libgd3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605258" version="1" comment="libqt4 is &lt;4.8.7-lp151.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151228" version="1" comment="libqt4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605259" version="1" comment="libqt4-32bit is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151229" version="1" comment="libqt4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605260" version="1" comment="libqt4-devel is &lt;4.8.7-lp151.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151230" version="1" comment="libqt4-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605261" version="1" comment="libqt4-devel-32bit is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230219" version="1" comment="libqt4-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605262" version="1" comment="libqt4-devel-doc is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230220" version="1" comment="libqt4-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605263" version="1" comment="libqt4-devel-doc-data is &lt;4.8.7-lp151.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230221" version="1" comment="libqt4-devel-doc-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605264" version="1" comment="libqt4-linguist is &lt;4.8.7-lp151.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151231" version="1" comment="libqt4-linguist is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605265" version="1" comment="libqt4-private-headers-devel is &lt;4.8.7-lp151.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230222" version="1" comment="libqt4-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605266" version="1" comment="libqt4-qt3support is &lt;4.8.7-lp151.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151232" version="1" comment="libqt4-qt3support is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605267" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151233" version="1" comment="libqt4-qt3support-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605268" version="1" comment="libqt4-sql is &lt;4.8.7-lp151.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151234" version="1" comment="libqt4-sql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605269" version="1" comment="libqt4-sql-32bit is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151235" version="1" comment="libqt4-sql-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605270" version="1" comment="libqt4-sql-postgresql is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151238" version="1" comment="libqt4-sql-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605271" version="1" comment="libqt4-sql-sqlite is &lt;4.8.7-lp151.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151240" version="1" comment="libqt4-sql-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605272" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151241" version="1" comment="libqt4-sql-sqlite-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605273" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151242" version="1" comment="libqt4-sql-unixODBC is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605274" version="1" comment="libqt4-x11 is &lt;4.8.7-lp151.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151244" version="1" comment="libqt4-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605275" version="1" comment="libqt4-x11-32bit is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151245" version="1" comment="libqt4-x11-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605276" version="1" comment="qt4-x11-tools is &lt;4.8.7-lp151.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230226" version="1" comment="qt4-x11-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601267" version="1" comment="evolution is &lt;3.26.6-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254401" version="1" comment="evolution is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601268" version="1" comment="evolution-devel is &lt;3.26.6-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254402" version="1" comment="evolution-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601269" version="1" comment="evolution-lang is &lt;3.26.6-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254403" version="1" comment="evolution-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601270" version="1" comment="evolution-plugin-bogofilter is &lt;3.26.6-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254404" version="1" comment="evolution-plugin-bogofilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601271" version="1" comment="evolution-plugin-pst-import is &lt;3.26.6-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254405" version="1" comment="evolution-plugin-pst-import is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601272" version="1" comment="evolution-plugin-spamassassin is &lt;3.26.6-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254406" version="1" comment="evolution-plugin-spamassassin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601273" version="1" comment="glade-catalog-evolution is &lt;3.26.6-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009254407" version="1" comment="glade-catalog-evolution is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601623" version="1" comment="docker is &lt;18.09.6_ce-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601624" version="1" comment="docker-bash-completion is &lt;18.09.6_ce-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601625" version="1" comment="docker-test is &lt;18.09.6_ce-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601626" version="1" comment="docker-zsh-completion is &lt;18.09.6_ce-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602574" version="1" comment="fuse-overlayfs is &lt;0.4.1-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266785" version="1" comment="fuse-overlayfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602575" version="1" comment="fuse3 is &lt;3.6.1-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266786" version="1" comment="fuse3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602576" version="1" comment="fuse3-devel is &lt;3.6.1-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266787" version="1" comment="fuse3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602577" version="1" comment="fuse3-doc is &lt;3.6.1-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266788" version="1" comment="fuse3-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602578" version="1" comment="libcontainers-common is &lt;20190401-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266789" version="1" comment="libcontainers-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602579" version="1" comment="libfuse3-3 is &lt;3.6.1-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266790" version="1" comment="libfuse3-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602580" version="1" comment="podman is &lt;1.4.4-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266791" version="1" comment="podman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602581" version="1" comment="podman-cni-config is &lt;1.4.4-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266792" version="1" comment="podman-cni-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602582" version="1" comment="slirp4netns is &lt;0.3.0-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266793" version="1" comment="slirp4netns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604403" version="1" comment="python2-salt is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174859" version="1" comment="python2-salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604404" version="1" comment="python3-salt is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174860" version="1" comment="python3-salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604405" version="1" comment="salt is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153592" version="1" comment="salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604406" version="1" comment="salt-api is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153593" version="1" comment="salt-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604407" version="1" comment="salt-bash-completion is &lt;3000-lp151.5.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153594" version="1" comment="salt-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604408" version="1" comment="salt-cloud is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153595" version="1" comment="salt-cloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604409" version="1" comment="salt-doc is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153596" version="1" comment="salt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604410" version="1" comment="salt-fish-completion is &lt;3000-lp151.5.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153597" version="1" comment="salt-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604411" version="1" comment="salt-master is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153598" version="1" comment="salt-master is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604412" version="1" comment="salt-minion is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153599" version="1" comment="salt-minion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604413" version="1" comment="salt-proxy is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153600" version="1" comment="salt-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604414" version="1" comment="salt-ssh is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153602" version="1" comment="salt-ssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604415" version="1" comment="salt-standalone-formulas-configuration is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280429" version="1" comment="salt-standalone-formulas-configuration is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604416" version="1" comment="salt-syndic is &lt;3000-lp151.5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153603" version="1" comment="salt-syndic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604417" version="1" comment="salt-zsh-completion is &lt;3000-lp151.5.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153604" version="1" comment="salt-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601332" version="1" comment="transfig is &lt;3.2.6a-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172240" version="1" comment="transfig is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603321" version="1" comment="libpcap-devel is &lt;1.8.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155206" version="1" comment="libpcap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603322" version="1" comment="libpcap-devel-32bit is &lt;1.8.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155208" version="1" comment="libpcap-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603323" version="1" comment="libpcap-devel-static is &lt;1.8.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155210" version="1" comment="libpcap-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603324" version="1" comment="libpcap1 is &lt;1.8.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155212" version="1" comment="libpcap1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603325" version="1" comment="libpcap1-32bit is &lt;1.8.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155214" version="1" comment="libpcap1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606622" version="1" comment="ruby2.5-rubygem-rack is &lt;2.0.8-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278437" version="1" comment="ruby2.5-rubygem-rack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606623" version="1" comment="ruby2.5-rubygem-rack-doc is &lt;2.0.8-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278438" version="1" comment="ruby2.5-rubygem-rack-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606624" version="1" comment="ruby2.5-rubygem-rack-testsuite is &lt;2.0.8-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278439" version="1" comment="ruby2.5-rubygem-rack-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603384" version="1" comment="libzzip-0-13 is &lt;0.13.69-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155239" version="1" comment="libzzip-0-13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603385" version="1" comment="libzzip-0-13-32bit is &lt;0.13.69-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155241" version="1" comment="libzzip-0-13-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603386" version="1" comment="zziplib-devel is &lt;0.13.69-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251928" version="1" comment="zziplib-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603387" version="1" comment="zziplib-devel-32bit is &lt;0.13.69-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251929" version="1" comment="zziplib-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609654" version="1" comment="ansible is &lt;2.8.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166857" version="1" comment="ansible is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601535" version="1" comment="libipa_hbac-devel is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152068" version="1" comment="libipa_hbac-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601536" version="1" comment="libipa_hbac0 is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152069" version="1" comment="libipa_hbac0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601537" version="1" comment="libnfsidmap-sss is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231788" version="1" comment="libnfsidmap-sss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601538" version="1" comment="libsss_certmap-devel is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231789" version="1" comment="libsss_certmap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601539" version="1" comment="libsss_certmap0 is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231790" version="1" comment="libsss_certmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601540" version="1" comment="libsss_idmap-devel is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152070" version="1" comment="libsss_idmap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601541" version="1" comment="libsss_idmap0 is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151530" version="1" comment="libsss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601542" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152071" version="1" comment="libsss_nss_idmap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601543" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152072" version="1" comment="libsss_nss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601544" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231791" version="1" comment="libsss_simpleifp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601545" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231792" version="1" comment="libsss_simpleifp0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601546" version="1" comment="python3-ipa_hbac is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231793" version="1" comment="python3-ipa_hbac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601547" version="1" comment="python3-sss-murmur is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231794" version="1" comment="python3-sss-murmur is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601548" version="1" comment="python3-sss_nss_idmap is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231795" version="1" comment="python3-sss_nss_idmap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601549" version="1" comment="python3-sssd-config is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231796" version="1" comment="python3-sssd-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601550" version="1" comment="sssd is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151531" version="1" comment="sssd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601551" version="1" comment="sssd-32bit is &lt;1.16.1-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151532" version="1" comment="sssd-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601552" version="1" comment="sssd-ad is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152077" version="1" comment="sssd-ad is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601553" version="1" comment="sssd-dbus is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231797" version="1" comment="sssd-dbus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601554" version="1" comment="sssd-ipa is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152078" version="1" comment="sssd-ipa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601555" version="1" comment="sssd-krb5 is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152079" version="1" comment="sssd-krb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601556" version="1" comment="sssd-krb5-common is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151533" version="1" comment="sssd-krb5-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601557" version="1" comment="sssd-ldap is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151534" version="1" comment="sssd-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601558" version="1" comment="sssd-proxy is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152080" version="1" comment="sssd-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601559" version="1" comment="sssd-tools is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152081" version="1" comment="sssd-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601560" version="1" comment="sssd-wbclient is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231798" version="1" comment="sssd-wbclient is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601561" version="1" comment="sssd-wbclient-devel is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231799" version="1" comment="sssd-wbclient-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601562" version="1" comment="sssd-winbind-idmap is &lt;1.16.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231800" version="1" comment="sssd-winbind-idmap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602679" version="1" comment="nginx is &lt;1.14.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153280" version="1" comment="nginx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602680" version="1" comment="nginx-source is &lt;1.14.2-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266795" version="1" comment="nginx-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602681" version="1" comment="vim-plugin-nginx is &lt;1.14.2-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173966" version="1" comment="vim-plugin-nginx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602165" version="1" comment="libixion-0_14-0 is &lt;0.14.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262159" version="1" comment="libixion-0_14-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602166" version="1" comment="libixion-devel is &lt;0.14.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153322" version="1" comment="libixion-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602167" version="1" comment="libixion-tools is &lt;0.14.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153324" version="1" comment="libixion-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602168" version="1" comment="liborcus-0_14-0 is &lt;0.14.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262164" version="1" comment="liborcus-0_14-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602169" version="1" comment="liborcus-devel is &lt;0.14.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153327" version="1" comment="liborcus-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602170" version="1" comment="liborcus-tools is &lt;0.14.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153329" version="1" comment="liborcus-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602171" version="1" comment="libreoffice is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151462" version="1" comment="libreoffice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602172" version="1" comment="libreoffice-base is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151463" version="1" comment="libreoffice-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602173" version="1" comment="libreoffice-base-drivers-firebird is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233578" version="1" comment="libreoffice-base-drivers-firebird is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602174" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153330" version="1" comment="libreoffice-base-drivers-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602175" version="1" comment="libreoffice-branding-upstream is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151465" version="1" comment="libreoffice-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602176" version="1" comment="libreoffice-calc is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151466" version="1" comment="libreoffice-calc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602177" version="1" comment="libreoffice-calc-extensions is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151467" version="1" comment="libreoffice-calc-extensions is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602178" version="1" comment="libreoffice-draw is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151468" version="1" comment="libreoffice-draw is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602179" version="1" comment="libreoffice-filters-optional is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151469" version="1" comment="libreoffice-filters-optional is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602180" version="1" comment="libreoffice-gdb-pretty-printers is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153331" version="1" comment="libreoffice-gdb-pretty-printers is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602181" version="1" comment="libreoffice-glade is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153332" version="1" comment="libreoffice-glade is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602182" version="1" comment="libreoffice-gnome is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151470" version="1" comment="libreoffice-gnome is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602183" version="1" comment="libreoffice-gtk2 is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009176159" version="1" comment="libreoffice-gtk2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602184" version="1" comment="libreoffice-gtk3 is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153333" version="1" comment="libreoffice-gtk3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602185" version="1" comment="libreoffice-icon-themes is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009176160" version="1" comment="libreoffice-icon-themes is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602186" version="1" comment="libreoffice-impress is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151477" version="1" comment="libreoffice-impress is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602187" version="1" comment="libreoffice-l10n-af is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153334" version="1" comment="libreoffice-l10n-af is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602188" version="1" comment="libreoffice-l10n-am is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239716" version="1" comment="libreoffice-l10n-am is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602189" version="1" comment="libreoffice-l10n-ar is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153335" version="1" comment="libreoffice-l10n-ar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602190" version="1" comment="libreoffice-l10n-as is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153336" version="1" comment="libreoffice-l10n-as is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602191" version="1" comment="libreoffice-l10n-ast is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239717" version="1" comment="libreoffice-l10n-ast is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602192" version="1" comment="libreoffice-l10n-be is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239718" version="1" comment="libreoffice-l10n-be is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602193" version="1" comment="libreoffice-l10n-bg is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153337" version="1" comment="libreoffice-l10n-bg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602194" version="1" comment="libreoffice-l10n-bn is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153338" version="1" comment="libreoffice-l10n-bn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602195" version="1" comment="libreoffice-l10n-bn_IN is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239719" version="1" comment="libreoffice-l10n-bn_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602196" version="1" comment="libreoffice-l10n-bo is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239720" version="1" comment="libreoffice-l10n-bo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602197" version="1" comment="libreoffice-l10n-br is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153339" version="1" comment="libreoffice-l10n-br is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602198" version="1" comment="libreoffice-l10n-brx is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239721" version="1" comment="libreoffice-l10n-brx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602199" version="1" comment="libreoffice-l10n-bs is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239722" version="1" comment="libreoffice-l10n-bs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602200" version="1" comment="libreoffice-l10n-ca is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153340" version="1" comment="libreoffice-l10n-ca is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602201" version="1" comment="libreoffice-l10n-ca_valencia is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239723" version="1" comment="libreoffice-l10n-ca_valencia is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602202" version="1" comment="libreoffice-l10n-cs is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151479" version="1" comment="libreoffice-l10n-cs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602203" version="1" comment="libreoffice-l10n-cy is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153341" version="1" comment="libreoffice-l10n-cy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602204" version="1" comment="libreoffice-l10n-da is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151480" version="1" comment="libreoffice-l10n-da is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602205" version="1" comment="libreoffice-l10n-de is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151481" version="1" comment="libreoffice-l10n-de is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602206" version="1" comment="libreoffice-l10n-dgo is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239724" version="1" comment="libreoffice-l10n-dgo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602207" version="1" comment="libreoffice-l10n-dsb is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262204" version="1" comment="libreoffice-l10n-dsb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602208" version="1" comment="libreoffice-l10n-dz is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153342" version="1" comment="libreoffice-l10n-dz is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602209" version="1" comment="libreoffice-l10n-el is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151482" version="1" comment="libreoffice-l10n-el is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602210" version="1" comment="libreoffice-l10n-en is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151483" version="1" comment="libreoffice-l10n-en is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602211" version="1" comment="libreoffice-l10n-en_GB is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239725" version="1" comment="libreoffice-l10n-en_GB is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602212" version="1" comment="libreoffice-l10n-en_ZA is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239726" version="1" comment="libreoffice-l10n-en_ZA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602213" version="1" comment="libreoffice-l10n-eo is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171437" version="1" comment="libreoffice-l10n-eo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602214" version="1" comment="libreoffice-l10n-es is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151484" version="1" comment="libreoffice-l10n-es is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602215" version="1" comment="libreoffice-l10n-et is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153343" version="1" comment="libreoffice-l10n-et is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602216" version="1" comment="libreoffice-l10n-eu is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153344" version="1" comment="libreoffice-l10n-eu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602217" version="1" comment="libreoffice-l10n-fa is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153345" version="1" comment="libreoffice-l10n-fa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602218" version="1" comment="libreoffice-l10n-fi is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153346" version="1" comment="libreoffice-l10n-fi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602219" version="1" comment="libreoffice-l10n-fr is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151485" version="1" comment="libreoffice-l10n-fr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602220" version="1" comment="libreoffice-l10n-fy is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239727" version="1" comment="libreoffice-l10n-fy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602221" version="1" comment="libreoffice-l10n-ga is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153347" version="1" comment="libreoffice-l10n-ga is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602222" version="1" comment="libreoffice-l10n-gd is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239728" version="1" comment="libreoffice-l10n-gd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602223" version="1" comment="libreoffice-l10n-gl is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153348" version="1" comment="libreoffice-l10n-gl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602224" version="1" comment="libreoffice-l10n-gu is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153349" version="1" comment="libreoffice-l10n-gu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602225" version="1" comment="libreoffice-l10n-gug is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239729" version="1" comment="libreoffice-l10n-gug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602226" version="1" comment="libreoffice-l10n-he is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153350" version="1" comment="libreoffice-l10n-he is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602227" version="1" comment="libreoffice-l10n-hi is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153351" version="1" comment="libreoffice-l10n-hi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602228" version="1" comment="libreoffice-l10n-hr is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153352" version="1" comment="libreoffice-l10n-hr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602229" version="1" comment="libreoffice-l10n-hsb is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239730" version="1" comment="libreoffice-l10n-hsb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602230" version="1" comment="libreoffice-l10n-hu is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151486" version="1" comment="libreoffice-l10n-hu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602231" version="1" comment="libreoffice-l10n-id is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239731" version="1" comment="libreoffice-l10n-id is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602232" version="1" comment="libreoffice-l10n-is is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239732" version="1" comment="libreoffice-l10n-is is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602233" version="1" comment="libreoffice-l10n-it is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151487" version="1" comment="libreoffice-l10n-it is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602234" version="1" comment="libreoffice-l10n-ja is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151488" version="1" comment="libreoffice-l10n-ja is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602235" version="1" comment="libreoffice-l10n-ka is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239733" version="1" comment="libreoffice-l10n-ka is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602236" version="1" comment="libreoffice-l10n-kab is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239734" version="1" comment="libreoffice-l10n-kab is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602237" version="1" comment="libreoffice-l10n-kk is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153353" version="1" comment="libreoffice-l10n-kk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602238" version="1" comment="libreoffice-l10n-km is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239735" version="1" comment="libreoffice-l10n-km is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602239" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239736" version="1" comment="libreoffice-l10n-kmr_Latn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602240" version="1" comment="libreoffice-l10n-kn is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153354" version="1" comment="libreoffice-l10n-kn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602241" version="1" comment="libreoffice-l10n-ko is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153355" version="1" comment="libreoffice-l10n-ko is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602242" version="1" comment="libreoffice-l10n-kok is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239737" version="1" comment="libreoffice-l10n-kok is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602243" version="1" comment="libreoffice-l10n-ks is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239738" version="1" comment="libreoffice-l10n-ks is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602244" version="1" comment="libreoffice-l10n-lb is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239739" version="1" comment="libreoffice-l10n-lb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602245" version="1" comment="libreoffice-l10n-lo is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239740" version="1" comment="libreoffice-l10n-lo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602246" version="1" comment="libreoffice-l10n-lt is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153356" version="1" comment="libreoffice-l10n-lt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602247" version="1" comment="libreoffice-l10n-lv is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153357" version="1" comment="libreoffice-l10n-lv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602248" version="1" comment="libreoffice-l10n-mai is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153358" version="1" comment="libreoffice-l10n-mai is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602249" version="1" comment="libreoffice-l10n-mk is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239741" version="1" comment="libreoffice-l10n-mk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602250" version="1" comment="libreoffice-l10n-ml is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153359" version="1" comment="libreoffice-l10n-ml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602251" version="1" comment="libreoffice-l10n-mn is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239742" version="1" comment="libreoffice-l10n-mn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602252" version="1" comment="libreoffice-l10n-mni is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239743" version="1" comment="libreoffice-l10n-mni is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602253" version="1" comment="libreoffice-l10n-mr is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153360" version="1" comment="libreoffice-l10n-mr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602254" version="1" comment="libreoffice-l10n-my is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239744" version="1" comment="libreoffice-l10n-my is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602255" version="1" comment="libreoffice-l10n-nb is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153361" version="1" comment="libreoffice-l10n-nb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602256" version="1" comment="libreoffice-l10n-ne is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239745" version="1" comment="libreoffice-l10n-ne is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602257" version="1" comment="libreoffice-l10n-nl is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153362" version="1" comment="libreoffice-l10n-nl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602258" version="1" comment="libreoffice-l10n-nn is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153363" version="1" comment="libreoffice-l10n-nn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602259" version="1" comment="libreoffice-l10n-nr is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153364" version="1" comment="libreoffice-l10n-nr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602260" version="1" comment="libreoffice-l10n-nso is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153365" version="1" comment="libreoffice-l10n-nso is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602261" version="1" comment="libreoffice-l10n-oc is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239746" version="1" comment="libreoffice-l10n-oc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602262" version="1" comment="libreoffice-l10n-om is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239747" version="1" comment="libreoffice-l10n-om is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602263" version="1" comment="libreoffice-l10n-or is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153366" version="1" comment="libreoffice-l10n-or is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602264" version="1" comment="libreoffice-l10n-pa is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153367" version="1" comment="libreoffice-l10n-pa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602265" version="1" comment="libreoffice-l10n-pl is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151489" version="1" comment="libreoffice-l10n-pl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602266" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158758" version="1" comment="libreoffice-l10n-pt_BR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602267" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158759" version="1" comment="libreoffice-l10n-pt_PT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602268" version="1" comment="libreoffice-l10n-ro is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153370" version="1" comment="libreoffice-l10n-ro is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602269" version="1" comment="libreoffice-l10n-ru is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151490" version="1" comment="libreoffice-l10n-ru is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602270" version="1" comment="libreoffice-l10n-rw is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239748" version="1" comment="libreoffice-l10n-rw is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602271" version="1" comment="libreoffice-l10n-sa_IN is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239749" version="1" comment="libreoffice-l10n-sa_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602272" version="1" comment="libreoffice-l10n-sat is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239750" version="1" comment="libreoffice-l10n-sat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602273" version="1" comment="libreoffice-l10n-sd is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239751" version="1" comment="libreoffice-l10n-sd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602274" version="1" comment="libreoffice-l10n-si is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153371" version="1" comment="libreoffice-l10n-si is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602275" version="1" comment="libreoffice-l10n-sid is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239752" version="1" comment="libreoffice-l10n-sid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602276" version="1" comment="libreoffice-l10n-sk is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153372" version="1" comment="libreoffice-l10n-sk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602277" version="1" comment="libreoffice-l10n-sl is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153373" version="1" comment="libreoffice-l10n-sl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602278" version="1" comment="libreoffice-l10n-sq is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239753" version="1" comment="libreoffice-l10n-sq is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602279" version="1" comment="libreoffice-l10n-sr is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153374" version="1" comment="libreoffice-l10n-sr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602280" version="1" comment="libreoffice-l10n-ss is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153375" version="1" comment="libreoffice-l10n-ss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602281" version="1" comment="libreoffice-l10n-st is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153376" version="1" comment="libreoffice-l10n-st is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602282" version="1" comment="libreoffice-l10n-sv is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153377" version="1" comment="libreoffice-l10n-sv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602283" version="1" comment="libreoffice-l10n-sw_TZ is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239754" version="1" comment="libreoffice-l10n-sw_TZ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602284" version="1" comment="libreoffice-l10n-ta is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153378" version="1" comment="libreoffice-l10n-ta is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602285" version="1" comment="libreoffice-l10n-te is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153379" version="1" comment="libreoffice-l10n-te is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602286" version="1" comment="libreoffice-l10n-tg is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239755" version="1" comment="libreoffice-l10n-tg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602287" version="1" comment="libreoffice-l10n-th is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153380" version="1" comment="libreoffice-l10n-th is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602288" version="1" comment="libreoffice-l10n-tn is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153381" version="1" comment="libreoffice-l10n-tn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602289" version="1" comment="libreoffice-l10n-tr is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153382" version="1" comment="libreoffice-l10n-tr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602290" version="1" comment="libreoffice-l10n-ts is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153383" version="1" comment="libreoffice-l10n-ts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602291" version="1" comment="libreoffice-l10n-tt is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239756" version="1" comment="libreoffice-l10n-tt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602292" version="1" comment="libreoffice-l10n-ug is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239757" version="1" comment="libreoffice-l10n-ug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602293" version="1" comment="libreoffice-l10n-uk is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153384" version="1" comment="libreoffice-l10n-uk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602294" version="1" comment="libreoffice-l10n-uz is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239758" version="1" comment="libreoffice-l10n-uz is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602295" version="1" comment="libreoffice-l10n-ve is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153385" version="1" comment="libreoffice-l10n-ve is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602296" version="1" comment="libreoffice-l10n-vec is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239759" version="1" comment="libreoffice-l10n-vec is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602297" version="1" comment="libreoffice-l10n-vi is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239760" version="1" comment="libreoffice-l10n-vi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602298" version="1" comment="libreoffice-l10n-xh is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153386" version="1" comment="libreoffice-l10n-xh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602299" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158760" version="1" comment="libreoffice-l10n-zh_CN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602300" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158761" version="1" comment="libreoffice-l10n-zh_TW is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602301" version="1" comment="libreoffice-l10n-zu is &lt;6.2.5.2-lp151.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153389" version="1" comment="libreoffice-l10n-zu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602302" version="1" comment="libreoffice-mailmerge is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151491" version="1" comment="libreoffice-mailmerge is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602303" version="1" comment="libreoffice-math is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151492" version="1" comment="libreoffice-math is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602304" version="1" comment="libreoffice-officebean is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153390" version="1" comment="libreoffice-officebean is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602305" version="1" comment="libreoffice-pyuno is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151493" version="1" comment="libreoffice-pyuno is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602306" version="1" comment="libreoffice-qt5 is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239761" version="1" comment="libreoffice-qt5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602307" version="1" comment="libreoffice-sdk is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153391" version="1" comment="libreoffice-sdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602308" version="1" comment="libreoffice-sdk-doc is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153392" version="1" comment="libreoffice-sdk-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602309" version="1" comment="libreoffice-writer is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151494" version="1" comment="libreoffice-writer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602310" version="1" comment="libreoffice-writer-extensions is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151495" version="1" comment="libreoffice-writer-extensions is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602311" version="1" comment="libreofficekit is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153393" version="1" comment="libreofficekit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602312" version="1" comment="libreofficekit-devel is &lt;6.2.5.2-lp151.3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153394" version="1" comment="libreofficekit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602313" version="1" comment="libwps-0_4-4 is &lt;0.4.10-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153401" version="1" comment="libwps-0_4-4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602314" version="1" comment="libwps-devel is &lt;0.4.10-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153402" version="1" comment="libwps-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602315" version="1" comment="libwps-tools is &lt;0.4.10-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153403" version="1" comment="libwps-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602316" version="1" comment="mdds-1_4-devel is &lt;1.4.3-lp151.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262317" version="1" comment="mdds-1_4-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602317" version="1" comment="myspell-af_NA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153406" version="1" comment="myspell-af_NA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602318" version="1" comment="myspell-af_ZA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153407" version="1" comment="myspell-af_ZA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602319" version="1" comment="myspell-an is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153408" version="1" comment="myspell-an is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602320" version="1" comment="myspell-an_ES is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153409" version="1" comment="myspell-an_ES is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602321" version="1" comment="myspell-ar is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153410" version="1" comment="myspell-ar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602322" version="1" comment="myspell-ar_AE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153411" version="1" comment="myspell-ar_AE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602323" version="1" comment="myspell-ar_BH is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153412" version="1" comment="myspell-ar_BH is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602324" version="1" comment="myspell-ar_DZ is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153413" version="1" comment="myspell-ar_DZ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602325" version="1" comment="myspell-ar_EG is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153414" version="1" comment="myspell-ar_EG is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602326" version="1" comment="myspell-ar_IQ is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153415" version="1" comment="myspell-ar_IQ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602327" version="1" comment="myspell-ar_JO is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153416" version="1" comment="myspell-ar_JO is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602328" version="1" comment="myspell-ar_KW is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153417" version="1" comment="myspell-ar_KW is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602329" version="1" comment="myspell-ar_LB is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153418" version="1" comment="myspell-ar_LB is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602330" version="1" comment="myspell-ar_LY is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153419" version="1" comment="myspell-ar_LY is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602331" version="1" comment="myspell-ar_MA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153420" version="1" comment="myspell-ar_MA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602332" version="1" comment="myspell-ar_OM is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153421" version="1" comment="myspell-ar_OM is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602333" version="1" comment="myspell-ar_QA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153422" version="1" comment="myspell-ar_QA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602334" version="1" comment="myspell-ar_SA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153423" version="1" comment="myspell-ar_SA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602335" version="1" comment="myspell-ar_SD is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153424" version="1" comment="myspell-ar_SD is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602336" version="1" comment="myspell-ar_SY is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153425" version="1" comment="myspell-ar_SY is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602337" version="1" comment="myspell-ar_TN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153426" version="1" comment="myspell-ar_TN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602338" version="1" comment="myspell-ar_YE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153427" version="1" comment="myspell-ar_YE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602339" version="1" comment="myspell-be_BY is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153428" version="1" comment="myspell-be_BY is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602340" version="1" comment="myspell-bg_BG is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153429" version="1" comment="myspell-bg_BG is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602341" version="1" comment="myspell-bn_BD is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153430" version="1" comment="myspell-bn_BD is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602342" version="1" comment="myspell-bn_IN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153431" version="1" comment="myspell-bn_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602343" version="1" comment="myspell-bo is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158772" version="1" comment="myspell-bo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602344" version="1" comment="myspell-bo_CN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158773" version="1" comment="myspell-bo_CN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602345" version="1" comment="myspell-bo_IN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158774" version="1" comment="myspell-bo_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602346" version="1" comment="myspell-br_FR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153432" version="1" comment="myspell-br_FR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602347" version="1" comment="myspell-bs is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153433" version="1" comment="myspell-bs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602348" version="1" comment="myspell-bs_BA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153434" version="1" comment="myspell-bs_BA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602349" version="1" comment="myspell-ca is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153435" version="1" comment="myspell-ca is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602350" version="1" comment="myspell-ca_AD is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153436" version="1" comment="myspell-ca_AD is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602351" version="1" comment="myspell-ca_ES is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153437" version="1" comment="myspell-ca_ES is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602352" version="1" comment="myspell-ca_ES_valencia is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153438" version="1" comment="myspell-ca_ES_valencia is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602353" version="1" comment="myspell-ca_FR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153439" version="1" comment="myspell-ca_FR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602354" version="1" comment="myspell-ca_IT is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153440" version="1" comment="myspell-ca_IT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602355" version="1" comment="myspell-cs_CZ is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153441" version="1" comment="myspell-cs_CZ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602356" version="1" comment="myspell-da_DK is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153442" version="1" comment="myspell-da_DK is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602357" version="1" comment="myspell-de is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153443" version="1" comment="myspell-de is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602358" version="1" comment="myspell-de_AT is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153444" version="1" comment="myspell-de_AT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602359" version="1" comment="myspell-de_CH is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153445" version="1" comment="myspell-de_CH is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602360" version="1" comment="myspell-de_DE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153446" version="1" comment="myspell-de_DE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602361" version="1" comment="myspell-dictionaries is &lt;20190423-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153447" version="1" comment="myspell-dictionaries is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602362" version="1" comment="myspell-el_GR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153448" version="1" comment="myspell-el_GR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602363" version="1" comment="myspell-en is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153449" version="1" comment="myspell-en is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602364" version="1" comment="myspell-en_AU is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153450" version="1" comment="myspell-en_AU is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602365" version="1" comment="myspell-en_BS is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153451" version="1" comment="myspell-en_BS is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602366" version="1" comment="myspell-en_BZ is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153452" version="1" comment="myspell-en_BZ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602367" version="1" comment="myspell-en_CA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153453" version="1" comment="myspell-en_CA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602368" version="1" comment="myspell-en_GB is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153454" version="1" comment="myspell-en_GB is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602369" version="1" comment="myspell-en_GH is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153455" version="1" comment="myspell-en_GH is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602370" version="1" comment="myspell-en_IE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153456" version="1" comment="myspell-en_IE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602371" version="1" comment="myspell-en_IN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153457" version="1" comment="myspell-en_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602372" version="1" comment="myspell-en_JM is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153458" version="1" comment="myspell-en_JM is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602373" version="1" comment="myspell-en_MW is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153459" version="1" comment="myspell-en_MW is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602374" version="1" comment="myspell-en_NA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153460" version="1" comment="myspell-en_NA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602375" version="1" comment="myspell-en_NZ is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153461" version="1" comment="myspell-en_NZ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602376" version="1" comment="myspell-en_PH is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153462" version="1" comment="myspell-en_PH is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602377" version="1" comment="myspell-en_TT is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153463" version="1" comment="myspell-en_TT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602378" version="1" comment="myspell-en_US is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153464" version="1" comment="myspell-en_US is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602379" version="1" comment="myspell-en_ZA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153465" version="1" comment="myspell-en_ZA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602380" version="1" comment="myspell-en_ZW is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153466" version="1" comment="myspell-en_ZW is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602381" version="1" comment="myspell-es is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153467" version="1" comment="myspell-es is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602382" version="1" comment="myspell-es_AR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153468" version="1" comment="myspell-es_AR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602383" version="1" comment="myspell-es_BO is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153469" version="1" comment="myspell-es_BO is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602384" version="1" comment="myspell-es_CL is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153470" version="1" comment="myspell-es_CL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602385" version="1" comment="myspell-es_CO is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153471" version="1" comment="myspell-es_CO is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602386" version="1" comment="myspell-es_CR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153472" version="1" comment="myspell-es_CR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602387" version="1" comment="myspell-es_CU is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153473" version="1" comment="myspell-es_CU is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602388" version="1" comment="myspell-es_DO is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153474" version="1" comment="myspell-es_DO is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602389" version="1" comment="myspell-es_EC is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153475" version="1" comment="myspell-es_EC is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602390" version="1" comment="myspell-es_ES is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153476" version="1" comment="myspell-es_ES is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602391" version="1" comment="myspell-es_GT is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153477" version="1" comment="myspell-es_GT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602392" version="1" comment="myspell-es_HN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153478" version="1" comment="myspell-es_HN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602393" version="1" comment="myspell-es_MX is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153479" version="1" comment="myspell-es_MX is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602394" version="1" comment="myspell-es_NI is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153480" version="1" comment="myspell-es_NI is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602395" version="1" comment="myspell-es_PA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153481" version="1" comment="myspell-es_PA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602396" version="1" comment="myspell-es_PE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153482" version="1" comment="myspell-es_PE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602397" version="1" comment="myspell-es_PR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153483" version="1" comment="myspell-es_PR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602398" version="1" comment="myspell-es_PY is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153484" version="1" comment="myspell-es_PY is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602399" version="1" comment="myspell-es_SV is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153485" version="1" comment="myspell-es_SV is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602400" version="1" comment="myspell-es_UY is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153486" version="1" comment="myspell-es_UY is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602401" version="1" comment="myspell-es_VE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153487" version="1" comment="myspell-es_VE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602402" version="1" comment="myspell-et_EE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153488" version="1" comment="myspell-et_EE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602403" version="1" comment="myspell-fr_BE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153489" version="1" comment="myspell-fr_BE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602404" version="1" comment="myspell-fr_CA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153490" version="1" comment="myspell-fr_CA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602405" version="1" comment="myspell-fr_CH is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153491" version="1" comment="myspell-fr_CH is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602406" version="1" comment="myspell-fr_FR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153492" version="1" comment="myspell-fr_FR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602407" version="1" comment="myspell-fr_LU is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153493" version="1" comment="myspell-fr_LU is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602408" version="1" comment="myspell-fr_MC is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153494" version="1" comment="myspell-fr_MC is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602409" version="1" comment="myspell-gd_GB is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153495" version="1" comment="myspell-gd_GB is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602410" version="1" comment="myspell-gl is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153496" version="1" comment="myspell-gl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602411" version="1" comment="myspell-gl_ES is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153497" version="1" comment="myspell-gl_ES is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602412" version="1" comment="myspell-gu_IN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153498" version="1" comment="myspell-gu_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602413" version="1" comment="myspell-gug is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153499" version="1" comment="myspell-gug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602414" version="1" comment="myspell-gug_PY is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153500" version="1" comment="myspell-gug_PY is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602415" version="1" comment="myspell-he_IL is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153501" version="1" comment="myspell-he_IL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602416" version="1" comment="myspell-hi_IN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153502" version="1" comment="myspell-hi_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602417" version="1" comment="myspell-hr_HR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153503" version="1" comment="myspell-hr_HR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602418" version="1" comment="myspell-hu_HU is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153504" version="1" comment="myspell-hu_HU is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602419" version="1" comment="myspell-id is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239767" version="1" comment="myspell-id is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602420" version="1" comment="myspell-id_ID is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239768" version="1" comment="myspell-id_ID is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602421" version="1" comment="myspell-is is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153505" version="1" comment="myspell-is is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602422" version="1" comment="myspell-is_IS is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153506" version="1" comment="myspell-is_IS is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602423" version="1" comment="myspell-it_IT is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153507" version="1" comment="myspell-it_IT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602424" version="1" comment="myspell-kmr_Latn is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153508" version="1" comment="myspell-kmr_Latn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602425" version="1" comment="myspell-kmr_Latn_SY is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153509" version="1" comment="myspell-kmr_Latn_SY is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602426" version="1" comment="myspell-kmr_Latn_TR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153510" version="1" comment="myspell-kmr_Latn_TR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602427" version="1" comment="myspell-lightproof-en is &lt;20190423-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153511" version="1" comment="myspell-lightproof-en is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602428" version="1" comment="myspell-lightproof-hu_HU is &lt;20190423-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153512" version="1" comment="myspell-lightproof-hu_HU is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602429" version="1" comment="myspell-lightproof-pt_BR is &lt;20190423-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153513" version="1" comment="myspell-lightproof-pt_BR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602430" version="1" comment="myspell-lightproof-ru_RU is &lt;20190423-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153514" version="1" comment="myspell-lightproof-ru_RU is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602431" version="1" comment="myspell-lo_LA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153515" version="1" comment="myspell-lo_LA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602432" version="1" comment="myspell-lt_LT is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153516" version="1" comment="myspell-lt_LT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602433" version="1" comment="myspell-lv_LV is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153517" version="1" comment="myspell-lv_LV is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602434" version="1" comment="myspell-nb_NO is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153518" version="1" comment="myspell-nb_NO is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602435" version="1" comment="myspell-ne_NP is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153519" version="1" comment="myspell-ne_NP is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602436" version="1" comment="myspell-nl_BE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153520" version="1" comment="myspell-nl_BE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602437" version="1" comment="myspell-nl_NL is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153521" version="1" comment="myspell-nl_NL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602438" version="1" comment="myspell-nn_NO is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153522" version="1" comment="myspell-nn_NO is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602439" version="1" comment="myspell-no is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153523" version="1" comment="myspell-no is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602440" version="1" comment="myspell-oc_FR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153524" version="1" comment="myspell-oc_FR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602441" version="1" comment="myspell-pl_PL is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153525" version="1" comment="myspell-pl_PL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602442" version="1" comment="myspell-pt_AO is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153526" version="1" comment="myspell-pt_AO is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602443" version="1" comment="myspell-pt_BR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153527" version="1" comment="myspell-pt_BR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602444" version="1" comment="myspell-pt_PT is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153528" version="1" comment="myspell-pt_PT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602445" version="1" comment="myspell-ro is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153529" version="1" comment="myspell-ro is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602446" version="1" comment="myspell-ro_RO is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153530" version="1" comment="myspell-ro_RO is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602447" version="1" comment="myspell-ru_RU is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153531" version="1" comment="myspell-ru_RU is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602448" version="1" comment="myspell-si_LK is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153532" version="1" comment="myspell-si_LK is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602449" version="1" comment="myspell-sk_SK is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153533" version="1" comment="myspell-sk_SK is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602450" version="1" comment="myspell-sl_SI is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153534" version="1" comment="myspell-sl_SI is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602451" version="1" comment="myspell-sq_AL is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239769" version="1" comment="myspell-sq_AL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602452" version="1" comment="myspell-sr is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153535" version="1" comment="myspell-sr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602453" version="1" comment="myspell-sr_CS is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153536" version="1" comment="myspell-sr_CS is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602454" version="1" comment="myspell-sr_Latn_CS is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153537" version="1" comment="myspell-sr_Latn_CS is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602455" version="1" comment="myspell-sr_Latn_RS is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153538" version="1" comment="myspell-sr_Latn_RS is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602456" version="1" comment="myspell-sr_RS is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153539" version="1" comment="myspell-sr_RS is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602457" version="1" comment="myspell-sv_FI is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153540" version="1" comment="myspell-sv_FI is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602458" version="1" comment="myspell-sv_SE is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153541" version="1" comment="myspell-sv_SE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602459" version="1" comment="myspell-sw_TZ is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153542" version="1" comment="myspell-sw_TZ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602460" version="1" comment="myspell-te is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153543" version="1" comment="myspell-te is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602461" version="1" comment="myspell-te_IN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153544" version="1" comment="myspell-te_IN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602462" version="1" comment="myspell-th_TH is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153545" version="1" comment="myspell-th_TH is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602463" version="1" comment="myspell-tr is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239770" version="1" comment="myspell-tr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602464" version="1" comment="myspell-tr_TR is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239771" version="1" comment="myspell-tr_TR is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602465" version="1" comment="myspell-uk_UA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153546" version="1" comment="myspell-uk_UA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602466" version="1" comment="myspell-vi is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153547" version="1" comment="myspell-vi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602467" version="1" comment="myspell-vi_VN is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153548" version="1" comment="myspell-vi_VN is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602468" version="1" comment="myspell-zu_ZA is &lt;20190423-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153549" version="1" comment="myspell-zu_ZA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602469" version="1" comment="python3-libixion is &lt;0.14.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262471" version="1" comment="python3-libixion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602470" version="1" comment="python3-liborcus is &lt;0.14.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262473" version="1" comment="python3-liborcus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601657" version="1" comment="libheimdal is &lt;7.7.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162039" version="1" comment="libheimdal is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601658" version="1" comment="libheimdal-devel is &lt;7.7.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162041" version="1" comment="libheimdal-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601352" version="1" comment="gnutls is &lt;3.6.7-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151156" version="1" comment="gnutls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601353" version="1" comment="gnutls-guile is &lt;3.6.7-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235743" version="1" comment="gnutls-guile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601354" version="1" comment="libgnutls-dane-devel is &lt;3.6.7-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235744" version="1" comment="libgnutls-dane-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601355" version="1" comment="libgnutls-dane0 is &lt;3.6.7-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177127" version="1" comment="libgnutls-dane0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601356" version="1" comment="libgnutls-devel is &lt;3.6.7-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151157" version="1" comment="libgnutls-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601357" version="1" comment="libgnutls-devel-32bit is &lt;3.6.7-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153803" version="1" comment="libgnutls-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601358" version="1" comment="libgnutls30 is &lt;3.6.7-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177128" version="1" comment="libgnutls30 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601359" version="1" comment="libgnutls30-32bit is &lt;3.6.7-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235745" version="1" comment="libgnutls30-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601360" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153805" version="1" comment="libgnutlsxx-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601361" version="1" comment="libgnutlsxx28 is &lt;3.6.7-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153806" version="1" comment="libgnutlsxx28 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601814" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601815" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601816" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601817" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601818" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601819" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601820" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601821" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601822" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601823" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601824" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601825" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601826" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601827" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601828" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601829" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601830" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.10.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601831" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601832" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601833" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601834" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601312" version="1" comment="containerd is &lt;1.2.5-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601313" version="1" comment="containerd-ctr is &lt;1.2.5-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601314" version="1" comment="containerd-test is &lt;1.2.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153866" version="1" comment="containerd-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601315" version="1" comment="docker is &lt;18.09.6_ce-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601316" version="1" comment="docker-bash-completion is &lt;18.09.6_ce-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601317" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601318" version="1" comment="docker-runc is &lt;1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601319" version="1" comment="docker-runc-test is &lt;1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171079" version="1" comment="docker-runc-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601320" version="1" comment="docker-test is &lt;18.09.6_ce-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601321" version="1" comment="docker-zsh-completion is &lt;18.09.6_ce-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601322" version="1" comment="go is &lt;1.12-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153190" version="1" comment="go is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601323" version="1" comment="go-doc is &lt;1.12-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153191" version="1" comment="go-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601324" version="1" comment="go-race is &lt;1.12-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172676" version="1" comment="go-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601325" version="1" comment="go1.11 is &lt;1.11.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242156" version="1" comment="go1.11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601326" version="1" comment="go1.11-doc is &lt;1.11.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242158" version="1" comment="go1.11-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601327" version="1" comment="go1.11-race is &lt;1.11.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242160" version="1" comment="go1.11-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601328" version="1" comment="go1.12 is &lt;1.12.4-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256067" version="1" comment="go1.12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601329" version="1" comment="go1.12-doc is &lt;1.12.4-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256068" version="1" comment="go1.12-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601330" version="1" comment="go1.12-race is &lt;1.12.4-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256069" version="1" comment="go1.12-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601331" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601723" version="1" comment="python2-requests is &lt;2.20.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266797" version="1" comment="python2-requests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601724" version="1" comment="python2-requests-test is &lt;2.20.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266798" version="1" comment="python2-requests-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601725" version="1" comment="python3-requests is &lt;2.20.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152097" version="1" comment="python3-requests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601726" version="1" comment="python3-requests-test is &lt;2.20.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266799" version="1" comment="python3-requests-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609655" version="1" comment="icingacli is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275965" version="1" comment="icingacli is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609656" version="1" comment="icingaweb2 is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275967" version="1" comment="icingaweb2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609657" version="1" comment="icingaweb2-common is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275969" version="1" comment="icingaweb2-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609658" version="1" comment="icingaweb2-vendor-HTMLPurifier is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275971" version="1" comment="icingaweb2-vendor-HTMLPurifier is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609659" version="1" comment="icingaweb2-vendor-JShrink is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275973" version="1" comment="icingaweb2-vendor-JShrink is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609660" version="1" comment="icingaweb2-vendor-Parsedown is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275975" version="1" comment="icingaweb2-vendor-Parsedown is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609661" version="1" comment="icingaweb2-vendor-dompdf is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275977" version="1" comment="icingaweb2-vendor-dompdf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609662" version="1" comment="icingaweb2-vendor-lessphp is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275979" version="1" comment="icingaweb2-vendor-lessphp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609663" version="1" comment="icingaweb2-vendor-zf1 is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275981" version="1" comment="icingaweb2-vendor-zf1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609664" version="1" comment="php-Icinga is &lt;2.7.3-lp151.6.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275983" version="1" comment="php-Icinga is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608465" version="1" comment="libfreebl3 is &lt;3.47.1-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151498" version="1" comment="libfreebl3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608466" version="1" comment="libfreebl3-32bit is &lt;3.47.1-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152810" version="1" comment="libfreebl3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608467" version="1" comment="libfreebl3-hmac is &lt;3.47.1-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244408" version="1" comment="libfreebl3-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608468" version="1" comment="libfreebl3-hmac-32bit is &lt;3.47.1-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244409" version="1" comment="libfreebl3-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608469" version="1" comment="libsoftokn3 is &lt;3.47.1-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151499" version="1" comment="libsoftokn3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608470" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152811" version="1" comment="libsoftokn3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608471" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244410" version="1" comment="libsoftokn3-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608472" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.47.1-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244411" version="1" comment="libsoftokn3-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608473" version="1" comment="mozilla-nspr is &lt;4.23-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152084" version="1" comment="mozilla-nspr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608474" version="1" comment="mozilla-nspr-32bit is &lt;4.23-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152812" version="1" comment="mozilla-nspr-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608475" version="1" comment="mozilla-nspr-devel is &lt;4.23-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152085" version="1" comment="mozilla-nspr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608476" version="1" comment="mozilla-nss is &lt;3.47.1-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151500" version="1" comment="mozilla-nss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608477" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152813" version="1" comment="mozilla-nss-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608478" version="1" comment="mozilla-nss-certs is &lt;3.47.1-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151501" version="1" comment="mozilla-nss-certs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608479" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152814" version="1" comment="mozilla-nss-certs-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608480" version="1" comment="mozilla-nss-devel is &lt;3.47.1-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151502" version="1" comment="mozilla-nss-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608481" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152815" version="1" comment="mozilla-nss-sysinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608482" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.47.1-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152816" version="1" comment="mozilla-nss-sysinit-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608483" version="1" comment="mozilla-nss-tools is &lt;3.47.1-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151503" version="1" comment="mozilla-nss-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601972" version="1" comment="teeworlds is &lt;0.7.3.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266800" version="1" comment="teeworlds is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604983" version="1" comment="gettext-csharp is &lt;0.19.8.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290347" version="1" comment="gettext-csharp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604984" version="1" comment="gettext-java is &lt;0.19.8.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290348" version="1" comment="gettext-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604985" version="1" comment="gettext-runtime is &lt;0.19.8.1-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290349" version="1" comment="gettext-runtime is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604986" version="1" comment="gettext-runtime-32bit is &lt;0.19.8.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290350" version="1" comment="gettext-runtime-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604987" version="1" comment="gettext-runtime-mini is &lt;0.19.8.1-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290351" version="1" comment="gettext-runtime-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604988" version="1" comment="gettext-runtime-mini-tools-doc is &lt;0.19.8.1-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290352" version="1" comment="gettext-runtime-mini-tools-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604989" version="1" comment="gettext-runtime-tools-doc is &lt;0.19.8.1-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290353" version="1" comment="gettext-runtime-tools-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604990" version="1" comment="gettext-tools is &lt;0.19.8.1-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290354" version="1" comment="gettext-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604991" version="1" comment="gettext-tools-mini is &lt;0.19.8.1-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009290355" version="1" comment="gettext-tools-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609665" version="1" comment="lighttpd is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268321" version="1" comment="lighttpd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609666" version="1" comment="lighttpd-mod_authn_gssapi is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268323" version="1" comment="lighttpd-mod_authn_gssapi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609667" version="1" comment="lighttpd-mod_authn_ldap is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268325" version="1" comment="lighttpd-mod_authn_ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609668" version="1" comment="lighttpd-mod_authn_mysql is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268327" version="1" comment="lighttpd-mod_authn_mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609669" version="1" comment="lighttpd-mod_authn_pam is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268329" version="1" comment="lighttpd-mod_authn_pam is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609670" version="1" comment="lighttpd-mod_authn_sasl is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268331" version="1" comment="lighttpd-mod_authn_sasl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609671" version="1" comment="lighttpd-mod_cml is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268333" version="1" comment="lighttpd-mod_cml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609672" version="1" comment="lighttpd-mod_geoip is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268335" version="1" comment="lighttpd-mod_geoip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609673" version="1" comment="lighttpd-mod_magnet is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268337" version="1" comment="lighttpd-mod_magnet is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609674" version="1" comment="lighttpd-mod_maxminddb is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268339" version="1" comment="lighttpd-mod_maxminddb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609675" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268341" version="1" comment="lighttpd-mod_mysql_vhost is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609676" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268343" version="1" comment="lighttpd-mod_rrdtool is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609677" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268345" version="1" comment="lighttpd-mod_trigger_b4_dl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609678" version="1" comment="lighttpd-mod_vhostdb_dbi is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268347" version="1" comment="lighttpd-mod_vhostdb_dbi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609679" version="1" comment="lighttpd-mod_vhostdb_ldap is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268349" version="1" comment="lighttpd-mod_vhostdb_ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609680" version="1" comment="lighttpd-mod_vhostdb_mysql is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268351" version="1" comment="lighttpd-mod_vhostdb_mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609681" version="1" comment="lighttpd-mod_vhostdb_pgsql is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268353" version="1" comment="lighttpd-mod_vhostdb_pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609682" version="1" comment="lighttpd-mod_webdav is &lt;1.4.54-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268355" version="1" comment="lighttpd-mod_webdav is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609683" version="1" comment="tmux is &lt;3.1c-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298611" version="1" comment="tmux is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603243" version="1" comment="jasper is &lt;2.0.14-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603244" version="1" comment="libjasper-devel is &lt;2.0.14-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603245" version="1" comment="libjasper4 is &lt;2.0.14-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603246" version="1" comment="libjasper4-32bit is &lt;2.0.14-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601609" version="1" comment="aubio-tools is &lt;0.4.6-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174088" version="1" comment="aubio-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601610" version="1" comment="libaubio-devel is &lt;0.4.6-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174089" version="1" comment="libaubio-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601611" version="1" comment="libaubio5 is &lt;0.4.6-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229463" version="1" comment="libaubio5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601612" version="1" comment="libaubio5-32bit is &lt;0.4.6-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229464" version="1" comment="libaubio5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601613" version="1" comment="python2-aubio is &lt;0.4.6-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229466" version="1" comment="python2-aubio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601614" version="1" comment="python3-aubio is &lt;0.4.6-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229467" version="1" comment="python3-aubio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602032" version="1" comment="libvlc5 is &lt;3.0.7.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153021" version="1" comment="libvlc5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602033" version="1" comment="libvlccore9 is &lt;3.0.7.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261716" version="1" comment="libvlccore9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602034" version="1" comment="vlc is &lt;3.0.7.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153023" version="1" comment="vlc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602035" version="1" comment="vlc-codec-gstreamer is &lt;3.0.7.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164833" version="1" comment="vlc-codec-gstreamer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602036" version="1" comment="vlc-devel is &lt;3.0.7.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153024" version="1" comment="vlc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602037" version="1" comment="vlc-jack is &lt;3.0.7.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261717" version="1" comment="vlc-jack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602038" version="1" comment="vlc-lang is &lt;3.0.7.1-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164834" version="1" comment="vlc-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602039" version="1" comment="vlc-noX is &lt;3.0.7.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153026" version="1" comment="vlc-noX is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602040" version="1" comment="vlc-qt is &lt;3.0.7.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153028" version="1" comment="vlc-qt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602041" version="1" comment="vlc-vdpau is &lt;3.0.7.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261718" version="1" comment="vlc-vdpau is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601469" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154143" version="1" comment="apache2-mod_php7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601470" version="1" comment="php7 is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154144" version="1" comment="php7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601471" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154145" version="1" comment="php7-bcmath is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601472" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154146" version="1" comment="php7-bz2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601473" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154147" version="1" comment="php7-calendar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601474" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154148" version="1" comment="php7-ctype is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601475" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154149" version="1" comment="php7-curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601476" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154150" version="1" comment="php7-dba is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601477" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154151" version="1" comment="php7-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601478" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154152" version="1" comment="php7-dom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601479" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230509" version="1" comment="php7-embed is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601480" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154153" version="1" comment="php7-enchant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601481" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154154" version="1" comment="php7-exif is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601482" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154155" version="1" comment="php7-fastcgi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601483" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154156" version="1" comment="php7-fileinfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601484" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154157" version="1" comment="php7-firebird is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601485" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154158" version="1" comment="php7-fpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601486" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154159" version="1" comment="php7-ftp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601487" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154160" version="1" comment="php7-gd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601488" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154161" version="1" comment="php7-gettext is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601489" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154162" version="1" comment="php7-gmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601490" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154163" version="1" comment="php7-iconv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601491" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154165" version="1" comment="php7-intl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601492" version="1" comment="php7-json is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154166" version="1" comment="php7-json is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601493" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154167" version="1" comment="php7-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601494" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154168" version="1" comment="php7-mbstring is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601495" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154170" version="1" comment="php7-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601496" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154171" version="1" comment="php7-odbc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601497" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154172" version="1" comment="php7-opcache is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601498" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154173" version="1" comment="php7-openssl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601499" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154174" version="1" comment="php7-pcntl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601500" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154175" version="1" comment="php7-pdo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601501" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154176" version="1" comment="php7-pear is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601502" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154177" version="1" comment="php7-pear-Archive_Tar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601503" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154178" version="1" comment="php7-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601504" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154179" version="1" comment="php7-phar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601505" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154180" version="1" comment="php7-posix is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601506" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154182" version="1" comment="php7-readline is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601507" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154183" version="1" comment="php7-shmop is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601508" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154184" version="1" comment="php7-snmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601509" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154185" version="1" comment="php7-soap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601510" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154186" version="1" comment="php7-sockets is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601511" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230510" version="1" comment="php7-sodium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601512" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154187" version="1" comment="php7-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601513" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154188" version="1" comment="php7-sysvmsg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601514" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154189" version="1" comment="php7-sysvsem is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601515" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154190" version="1" comment="php7-sysvshm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601516" version="1" comment="php7-testresults is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009257401" version="1" comment="php7-testresults is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601517" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154191" version="1" comment="php7-tidy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601518" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154192" version="1" comment="php7-tokenizer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601519" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154193" version="1" comment="php7-wddx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601520" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154194" version="1" comment="php7-xmlreader is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601521" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154195" version="1" comment="php7-xmlrpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601522" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154196" version="1" comment="php7-xmlwriter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601523" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154197" version="1" comment="php7-xsl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601524" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154198" version="1" comment="php7-zip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601525" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154199" version="1" comment="php7-zlib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609684" version="1" comment="chromedriver is &lt;75.0.3770.142-lp151.2.12.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152651" version="1" comment="chromedriver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609685" version="1" comment="chromium is &lt;75.0.3770.142-lp151.2.12.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152652" version="1" comment="chromium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607022" version="1" comment="yast2-rmt is &lt;1.3.0-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242427" version="1" comment="yast2-rmt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609686" version="1" comment="rdesktop is &lt;1.8.6-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266803" version="1" comment="rdesktop is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601340" version="1" comment="libu2f-host-devel is &lt;1.1.6-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244552" version="1" comment="libu2f-host-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601341" version="1" comment="libu2f-host-doc is &lt;1.1.6-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244553" version="1" comment="libu2f-host-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601342" version="1" comment="libu2f-host0 is &lt;1.1.6-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244554" version="1" comment="libu2f-host0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601343" version="1" comment="u2f-host is &lt;1.1.6-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244555" version="1" comment="u2f-host is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609687" version="1" comment="PackageKit is &lt;1.1.10-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174862" version="1" comment="PackageKit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609688" version="1" comment="PackageKit-backend-zypp is &lt;1.1.10-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174863" version="1" comment="PackageKit-backend-zypp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609689" version="1" comment="PackageKit-branding-upstream is &lt;1.1.10-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174864" version="1" comment="PackageKit-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609690" version="1" comment="PackageKit-devel is &lt;1.1.10-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174865" version="1" comment="PackageKit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609691" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.10-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174866" version="1" comment="PackageKit-gstreamer-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609692" version="1" comment="PackageKit-gtk3-module is &lt;1.1.10-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174867" version="1" comment="PackageKit-gtk3-module is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609693" version="1" comment="PackageKit-lang is &lt;1.1.10-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174868" version="1" comment="PackageKit-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609694" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.10-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174869" version="1" comment="libpackagekit-glib2-18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609695" version="1" comment="libpackagekit-glib2-18-32bit is &lt;1.1.10-lp151.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174870" version="1" comment="libpackagekit-glib2-18-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609696" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.10-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174871" version="1" comment="libpackagekit-glib2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609697" version="1" comment="libpackagekit-glib2-devel-32bit is &lt;1.1.10-lp151.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174872" version="1" comment="libpackagekit-glib2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609698" version="1" comment="libsolv-demo is &lt;0.7.6-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234725" version="1" comment="libsolv-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609699" version="1" comment="libsolv-devel is &lt;0.7.6-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234726" version="1" comment="libsolv-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609700" version="1" comment="libsolv-tools is &lt;0.7.6-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234727" version="1" comment="libsolv-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609701" version="1" comment="libyui-ncurses-pkg-devel is &lt;2.48.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262475" version="1" comment="libyui-ncurses-pkg-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609702" version="1" comment="libyui-ncurses-pkg-doc is &lt;2.48.9-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009272847" version="1" comment="libyui-ncurses-pkg-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609703" version="1" comment="libyui-ncurses-pkg9 is &lt;2.48.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009272849" version="1" comment="libyui-ncurses-pkg9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609704" version="1" comment="libyui-qt-pkg-devel is &lt;2.45.27-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262478" version="1" comment="libyui-qt-pkg-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609705" version="1" comment="libyui-qt-pkg-doc is &lt;2.45.27-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009272853" version="1" comment="libyui-qt-pkg-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609706" version="1" comment="libyui-qt-pkg9 is &lt;2.45.27-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009272855" version="1" comment="libyui-qt-pkg9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609707" version="1" comment="libzypp is &lt;17.15.0-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161722" version="1" comment="libzypp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609708" version="1" comment="libzypp-devel is &lt;17.15.0-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161723" version="1" comment="libzypp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609709" version="1" comment="libzypp-devel-doc is &lt;17.15.0-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161724" version="1" comment="libzypp-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609710" version="1" comment="perl-solv is &lt;0.7.6-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234728" version="1" comment="perl-solv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609711" version="1" comment="python-solv is &lt;0.7.6-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234729" version="1" comment="python-solv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609712" version="1" comment="python3-solv is &lt;0.7.6-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234730" version="1" comment="python3-solv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609713" version="1" comment="ruby-solv is &lt;0.7.6-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234731" version="1" comment="ruby-solv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609714" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.10-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174873" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609715" version="1" comment="yast2-pkg-bindings is &lt;4.1.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162967" version="1" comment="yast2-pkg-bindings is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609716" version="1" comment="yast2-pkg-bindings-devel-doc is &lt;4.1.2-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162968" version="1" comment="yast2-pkg-bindings-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609717" version="1" comment="zypper is &lt;1.14.30-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251910" version="1" comment="zypper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609718" version="1" comment="zypper-aptitude is &lt;1.14.30-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251911" version="1" comment="zypper-aptitude is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609719" version="1" comment="zypper-log is &lt;1.14.30-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251912" version="1" comment="zypper-log is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609720" version="1" comment="zypper-needs-restarting is &lt;1.14.30-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262480" version="1" comment="zypper-needs-restarting is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606701" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606702" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606703" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606704" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606705" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606706" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606707" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606708" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606709" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606710" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606711" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606712" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606713" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606714" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606715" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606716" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606717" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606718" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.87.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606719" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606720" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606721" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.87.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609721" version="1" comment="mumble is &lt;1.2.19-lp151.4.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260552" version="1" comment="mumble is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509750" version="1" comment="mumble-32bit is &lt;1.2.19-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260554" version="1" comment="mumble-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609722" version="1" comment="mumble-server is &lt;1.2.19-lp151.4.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260556" version="1" comment="mumble-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601879" version="1" comment="expat is &lt;2.2.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151330" version="1" comment="expat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601880" version="1" comment="libexpat-devel is &lt;2.2.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151331" version="1" comment="libexpat-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601881" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151785" version="1" comment="libexpat-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601882" version="1" comment="libexpat1 is &lt;2.2.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151332" version="1" comment="libexpat1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601883" version="1" comment="libexpat1-32bit is &lt;2.2.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151333" version="1" comment="libexpat1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602507" version="1" comment="libpython2_7-1_0 is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151571" version="1" comment="libpython2_7-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602508" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.14-lp151.10.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151572" version="1" comment="libpython2_7-1_0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602509" version="1" comment="python is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151913" version="1" comment="python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602510" version="1" comment="python-32bit is &lt;2.7.14-lp151.10.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153290" version="1" comment="python-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602511" version="1" comment="python-base is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151573" version="1" comment="python-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602512" version="1" comment="python-base-32bit is &lt;2.7.14-lp151.10.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153291" version="1" comment="python-base-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602513" version="1" comment="python-curses is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151914" version="1" comment="python-curses is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602514" version="1" comment="python-demo is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153292" version="1" comment="python-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602515" version="1" comment="python-devel is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151574" version="1" comment="python-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602516" version="1" comment="python-doc is &lt;2.7.14-lp151.10.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153293" version="1" comment="python-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602517" version="1" comment="python-doc-pdf is &lt;2.7.14-lp151.10.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153294" version="1" comment="python-doc-pdf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602518" version="1" comment="python-gdbm is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151915" version="1" comment="python-gdbm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602519" version="1" comment="python-idle is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153295" version="1" comment="python-idle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602520" version="1" comment="python-tk is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153296" version="1" comment="python-tk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602521" version="1" comment="python-xml is &lt;2.7.14-lp151.10.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151575" version="1" comment="python-xml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602144" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602145" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602146" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602147" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602148" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602149" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602150" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602151" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602152" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602153" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602154" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602155" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602156" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602157" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602158" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602159" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602160" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602161" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602162" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602163" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602164" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603073" version="1" comment="libmodplug-devel is &lt;0.3.17-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230500" version="1" comment="libmodplug-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603074" version="1" comment="libmodplug1 is &lt;0.3.17-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151586" version="1" comment="libmodplug1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603075" version="1" comment="libmodplug1-32bit is &lt;0.3.17-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230501" version="1" comment="libmodplug1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603076" version="1" comment="libopenmpt-devel is &lt;0.3.17-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230503" version="1" comment="libopenmpt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603077" version="1" comment="libopenmpt0 is &lt;0.3.17-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230504" version="1" comment="libopenmpt0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603078" version="1" comment="libopenmpt0-32bit is &lt;0.3.17-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230505" version="1" comment="libopenmpt0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603079" version="1" comment="libopenmpt_modplug1 is &lt;0.3.17-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230506" version="1" comment="libopenmpt_modplug1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603080" version="1" comment="libopenmpt_modplug1-32bit is &lt;0.3.17-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230507" version="1" comment="libopenmpt_modplug1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603081" version="1" comment="openmpt123 is &lt;0.3.17-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230508" version="1" comment="openmpt123 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605046" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605047" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605048" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605049" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605050" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605051" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605052" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605053" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605054" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605055" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605056" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605057" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605058" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605059" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605060" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605061" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605062" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605063" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605064" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605065" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605066" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601418" version="1" comment="bind is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601419" version="1" comment="bind-chrootenv is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601420" version="1" comment="bind-devel is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601421" version="1" comment="bind-devel-32bit is &lt;9.11.2-lp151.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601422" version="1" comment="bind-doc is &lt;9.11.2-lp151.11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601423" version="1" comment="bind-lwresd is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153104" version="1" comment="bind-lwresd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601424" version="1" comment="bind-utils is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601425" version="1" comment="libbind9-160 is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177141" version="1" comment="libbind9-160 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601426" version="1" comment="libbind9-160-32bit is &lt;9.11.2-lp151.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256545" version="1" comment="libbind9-160-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601427" version="1" comment="libdns169 is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177142" version="1" comment="libdns169 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601428" version="1" comment="libdns169-32bit is &lt;9.11.2-lp151.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256548" version="1" comment="libdns169-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601429" version="1" comment="libirs-devel is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601430" version="1" comment="libirs160 is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177143" version="1" comment="libirs160 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601431" version="1" comment="libirs160-32bit is &lt;9.11.2-lp151.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256553" version="1" comment="libirs160-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601432" version="1" comment="libisc166 is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177144" version="1" comment="libisc166 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601433" version="1" comment="libisc166-32bit is &lt;9.11.2-lp151.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256556" version="1" comment="libisc166-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601434" version="1" comment="libisccc160 is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177145" version="1" comment="libisccc160 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601435" version="1" comment="libisccc160-32bit is &lt;9.11.2-lp151.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256559" version="1" comment="libisccc160-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601436" version="1" comment="libisccfg160 is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177146" version="1" comment="libisccfg160 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601437" version="1" comment="libisccfg160-32bit is &lt;9.11.2-lp151.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256562" version="1" comment="libisccfg160-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601438" version="1" comment="liblwres160 is &lt;9.11.2-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177147" version="1" comment="liblwres160 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601439" version="1" comment="liblwres160-32bit is &lt;9.11.2-lp151.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256565" version="1" comment="liblwres160-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601440" version="1" comment="python3-bind is &lt;9.11.2-lp151.11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607311" version="1" comment="strongswan is &lt;5.8.2-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607312" version="1" comment="strongswan-doc is &lt;5.8.2-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607313" version="1" comment="strongswan-hmac is &lt;5.8.2-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607314" version="1" comment="strongswan-ipsec is &lt;5.8.2-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607315" version="1" comment="strongswan-libs0 is &lt;5.8.2-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607316" version="1" comment="strongswan-mysql is &lt;5.8.2-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607317" version="1" comment="strongswan-nm is &lt;5.8.2-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607318" version="1" comment="strongswan-sqlite is &lt;5.8.2-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608097" version="1" comment="freetype2-devel is &lt;2.10.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151246" version="1" comment="freetype2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608098" version="1" comment="freetype2-devel-32bit is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171242" version="1" comment="freetype2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608099" version="1" comment="freetype2-profile-tti35 is &lt;2.10.1-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283722" version="1" comment="freetype2-profile-tti35 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608100" version="1" comment="ft2demos is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151247" version="1" comment="ft2demos is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608101" version="1" comment="ftbench is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177150" version="1" comment="ftbench is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608102" version="1" comment="ftdiff is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177151" version="1" comment="ftdiff is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608103" version="1" comment="ftdump is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177152" version="1" comment="ftdump is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608104" version="1" comment="ftgamma is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177153" version="1" comment="ftgamma is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608105" version="1" comment="ftgrid is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177154" version="1" comment="ftgrid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608106" version="1" comment="ftinspect is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177155" version="1" comment="ftinspect is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608107" version="1" comment="ftlint is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177156" version="1" comment="ftlint is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608108" version="1" comment="ftmulti is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177157" version="1" comment="ftmulti is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608109" version="1" comment="ftstring is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177158" version="1" comment="ftstring is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608110" version="1" comment="ftvalid is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177159" version="1" comment="ftvalid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608111" version="1" comment="ftview is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177160" version="1" comment="ftview is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608112" version="1" comment="libfreetype6 is &lt;2.10.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151248" version="1" comment="libfreetype6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608113" version="1" comment="libfreetype6-32bit is &lt;2.10.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151249" version="1" comment="libfreetype6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601362" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601363" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601364" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601365" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601366" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601367" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601368" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.4.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601369" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.4.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601370" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.4.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601371" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601372" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601373" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601374" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.4.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601375" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601376" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601377" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.4.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601378" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.4.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601379" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601380" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601381" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601382" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609184" version="1" comment="ntp is &lt;4.2.8p15-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151182" version="1" comment="ntp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609185" version="1" comment="ntp-doc is &lt;4.2.8p15-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151183" version="1" comment="ntp-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608191" version="1" comment="jasper is &lt;2.0.14-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608192" version="1" comment="libjasper-devel is &lt;2.0.14-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608193" version="1" comment="libjasper4 is &lt;2.0.14-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608194" version="1" comment="libjasper4-32bit is &lt;2.0.14-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601990" version="1" comment="tomcat is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152844" version="1" comment="tomcat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601991" version="1" comment="tomcat-admin-webapps is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152845" version="1" comment="tomcat-admin-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601992" version="1" comment="tomcat-docs-webapp is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152846" version="1" comment="tomcat-docs-webapp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601993" version="1" comment="tomcat-el-3_0-api is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152847" version="1" comment="tomcat-el-3_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601994" version="1" comment="tomcat-embed is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152848" version="1" comment="tomcat-embed is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601995" version="1" comment="tomcat-javadoc is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152849" version="1" comment="tomcat-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601996" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152850" version="1" comment="tomcat-jsp-2_3-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601997" version="1" comment="tomcat-jsvc is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152851" version="1" comment="tomcat-jsvc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601998" version="1" comment="tomcat-lib is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152852" version="1" comment="tomcat-lib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601999" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236693" version="1" comment="tomcat-servlet-4_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602000" version="1" comment="tomcat-webapps is &lt;9.0.21-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152854" version="1" comment="tomcat-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606959" version="1" comment="python-azure-agent is &lt;2.2.45-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246903" version="1" comment="python-azure-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606960" version="1" comment="python-azure-agent-test is &lt;2.2.45-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246904" version="1" comment="python-azure-agent-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603864" version="1" comment="cloud-init is &lt;19.2-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273021" version="1" comment="cloud-init is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603865" version="1" comment="cloud-init-config-suse is &lt;19.2-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273022" version="1" comment="cloud-init-config-suse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603866" version="1" comment="cloud-init-doc is &lt;19.2-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273023" version="1" comment="cloud-init-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609723" version="1" comment="otrs is &lt;6.0.29-lp151.2.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154272" version="1" comment="otrs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609724" version="1" comment="otrs-doc is &lt;6.0.29-lp151.2.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154273" version="1" comment="otrs-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609725" version="1" comment="otrs-itsm is &lt;6.0.29-lp151.2.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154274" version="1" comment="otrs-itsm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607241" version="1" comment="tomcat is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607242" version="1" comment="tomcat-admin-webapps is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607243" version="1" comment="tomcat-docs-webapp is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607244" version="1" comment="tomcat-el-3_0-api is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607245" version="1" comment="tomcat-embed is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607246" version="1" comment="tomcat-javadoc is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607247" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607248" version="1" comment="tomcat-jsvc is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607249" version="1" comment="tomcat-lib is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607250" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607251" version="1" comment="tomcat-webapps is &lt;9.0.30-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602583" version="1" comment="apache2 is &lt;2.4.33-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151165" version="1" comment="apache2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602584" version="1" comment="apache2-devel is &lt;2.4.33-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151166" version="1" comment="apache2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602585" version="1" comment="apache2-doc is &lt;2.4.33-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151167" version="1" comment="apache2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602586" version="1" comment="apache2-event is &lt;2.4.33-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153274" version="1" comment="apache2-event is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602587" version="1" comment="apache2-example-pages is &lt;2.4.33-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151168" version="1" comment="apache2-example-pages is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602588" version="1" comment="apache2-prefork is &lt;2.4.33-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151169" version="1" comment="apache2-prefork is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602589" version="1" comment="apache2-utils is &lt;2.4.33-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151170" version="1" comment="apache2-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602590" version="1" comment="apache2-worker is &lt;2.4.33-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153275" version="1" comment="apache2-worker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602617" version="1" comment="apache-commons-beanutils is &lt;1.9.2-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152132" version="1" comment="apache-commons-beanutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602618" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263520" version="1" comment="apache-commons-beanutils-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602075" version="1" comment="evince is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151448" version="1" comment="evince is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602076" version="1" comment="evince-devel is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159434" version="1" comment="evince-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602077" version="1" comment="evince-lang is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151449" version="1" comment="evince-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602078" version="1" comment="evince-plugin-comicsdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154092" version="1" comment="evince-plugin-comicsdocument is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602079" version="1" comment="evince-plugin-djvudocument is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154093" version="1" comment="evince-plugin-djvudocument is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602080" version="1" comment="evince-plugin-dvidocument is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154094" version="1" comment="evince-plugin-dvidocument is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602081" version="1" comment="evince-plugin-pdfdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154095" version="1" comment="evince-plugin-pdfdocument is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602082" version="1" comment="evince-plugin-psdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154096" version="1" comment="evince-plugin-psdocument is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602083" version="1" comment="evince-plugin-tiffdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154097" version="1" comment="evince-plugin-tiffdocument is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602084" version="1" comment="evince-plugin-xpsdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154098" version="1" comment="evince-plugin-xpsdocument is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602085" version="1" comment="libevdocument3-4 is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151450" version="1" comment="libevdocument3-4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602086" version="1" comment="libevview3-3 is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151451" version="1" comment="libevview3-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602087" version="1" comment="nautilus-evince is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151452" version="1" comment="nautilus-evince is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602088" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151453" version="1" comment="typelib-1_0-EvinceDocument-3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602089" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.26.0+20180128.1bd86963-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151454" version="1" comment="typelib-1_0-EvinceView-3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603622" version="1" comment="gdb is &lt;8.3.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152905" version="1" comment="gdb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603623" version="1" comment="gdb-testresults is &lt;8.3.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152906" version="1" comment="gdb-testresults is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603624" version="1" comment="gdbserver is &lt;8.3.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152907" version="1" comment="gdbserver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607508" version="1" comment="g3utils is &lt;1.1.37-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235645" version="1" comment="g3utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607509" version="1" comment="mgetty is &lt;1.1.37-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235646" version="1" comment="mgetty is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607510" version="1" comment="sendfax is &lt;1.1.37-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235647" version="1" comment="sendfax is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604621" version="1" comment="aubio-tools is &lt;0.4.6-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604622" version="1" comment="libaubio-devel is &lt;0.4.6-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604623" version="1" comment="libaubio5 is &lt;0.4.6-lp151.6.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604624" version="1" comment="libaubio5-32bit is &lt;0.4.6-lp151.6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604625" version="1" comment="python2-aubio is &lt;0.4.6-lp151.6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604626" version="1" comment="python3-aubio is &lt;0.4.6-lp151.6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608213" version="1" comment="libmspack-devel is &lt;0.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238457" version="1" comment="libmspack-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608214" version="1" comment="libmspack0 is &lt;0.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151459" version="1" comment="libmspack0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608215" version="1" comment="libmspack0-32bit is &lt;0.6-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238458" version="1" comment="libmspack0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608216" version="1" comment="mspack-tools is &lt;0.6-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247101" version="1" comment="mspack-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601448" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601449" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601450" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601451" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601452" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601453" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601454" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601455" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601456" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601457" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601458" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601459" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601460" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601461" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601462" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601463" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601464" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601465" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601466" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601467" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601468" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601867" version="1" comment="libecpg6-32bit is &lt;10.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151070" version="1" comment="libecpg6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601869" version="1" comment="libpq5-32bit is &lt;10.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151072" version="1" comment="libpq5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601408" version="1" comment="exim is &lt;4.88-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153580" version="1" comment="exim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601409" version="1" comment="eximon is &lt;4.88-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153581" version="1" comment="eximon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601410" version="1" comment="eximstats-html is &lt;4.88-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153582" version="1" comment="eximstats-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601679" version="1" comment="fence-agents is &lt;4.4.0+git.1558595666.5f79f9e9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260147" version="1" comment="fence-agents is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601680" version="1" comment="fence-agents-amt_ws is &lt;4.4.0+git.1558595666.5f79f9e9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260148" version="1" comment="fence-agents-amt_ws is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601681" version="1" comment="fence-agents-devel is &lt;4.4.0+git.1558595666.5f79f9e9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260149" version="1" comment="fence-agents-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602056" version="1" comment="libpython2_7-1_0 is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602057" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.14-lp151.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602058" version="1" comment="python is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602059" version="1" comment="python-32bit is &lt;2.7.14-lp151.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602060" version="1" comment="python-base is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602061" version="1" comment="python-base-32bit is &lt;2.7.14-lp151.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602062" version="1" comment="python-curses is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602063" version="1" comment="python-demo is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602064" version="1" comment="python-devel is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602065" version="1" comment="python-doc is &lt;2.7.14-lp151.10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602066" version="1" comment="python-doc-pdf is &lt;2.7.14-lp151.10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602067" version="1" comment="python-gdbm is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602068" version="1" comment="python-idle is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602069" version="1" comment="python-tk is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602070" version="1" comment="python-xml is &lt;2.7.14-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601688" version="1" comment="libvirt is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151423" version="1" comment="libvirt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601689" version="1" comment="libvirt-admin is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166268" version="1" comment="libvirt-admin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601690" version="1" comment="libvirt-bash-completion is &lt;5.1.0-lp151.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266806" version="1" comment="libvirt-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601691" version="1" comment="libvirt-client is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151424" version="1" comment="libvirt-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601692" version="1" comment="libvirt-daemon is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151425" version="1" comment="libvirt-daemon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601693" version="1" comment="libvirt-daemon-config-network is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151426" version="1" comment="libvirt-daemon-config-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601694" version="1" comment="libvirt-daemon-config-nwfilter is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151427" version="1" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601695" version="1" comment="libvirt-daemon-driver-interface is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151428" version="1" comment="libvirt-daemon-driver-interface is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601696" version="1" comment="libvirt-daemon-driver-libxl is &lt;5.1.0-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151429" version="1" comment="libvirt-daemon-driver-libxl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601697" version="1" comment="libvirt-daemon-driver-lxc is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151430" version="1" comment="libvirt-daemon-driver-lxc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601698" version="1" comment="libvirt-daemon-driver-network is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151431" version="1" comment="libvirt-daemon-driver-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601699" version="1" comment="libvirt-daemon-driver-nodedev is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151432" version="1" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601700" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151433" version="1" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601701" version="1" comment="libvirt-daemon-driver-qemu is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151434" version="1" comment="libvirt-daemon-driver-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601702" version="1" comment="libvirt-daemon-driver-secret is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151435" version="1" comment="libvirt-daemon-driver-secret is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601703" version="1" comment="libvirt-daemon-driver-storage is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151436" version="1" comment="libvirt-daemon-driver-storage is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601704" version="1" comment="libvirt-daemon-driver-storage-core is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161274" version="1" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601705" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161275" version="1" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601706" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266807" version="1" comment="libvirt-daemon-driver-storage-gluster is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601707" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161276" version="1" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601708" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161277" version="1" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601709" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161278" version="1" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601710" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;5.1.0-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161279" version="1" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601711" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161280" version="1" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601712" version="1" comment="libvirt-daemon-hooks is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170836" version="1" comment="libvirt-daemon-hooks is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601713" version="1" comment="libvirt-daemon-lxc is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151439" version="1" comment="libvirt-daemon-lxc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601714" version="1" comment="libvirt-daemon-qemu is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151440" version="1" comment="libvirt-daemon-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601715" version="1" comment="libvirt-daemon-xen is &lt;5.1.0-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151441" version="1" comment="libvirt-daemon-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601716" version="1" comment="libvirt-devel is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152991" version="1" comment="libvirt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601717" version="1" comment="libvirt-devel-32bit is &lt;5.1.0-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152992" version="1" comment="libvirt-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601718" version="1" comment="libvirt-doc is &lt;5.1.0-lp151.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152993" version="1" comment="libvirt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601719" version="1" comment="libvirt-libs is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161281" version="1" comment="libvirt-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601720" version="1" comment="libvirt-lock-sanlock is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152994" version="1" comment="libvirt-lock-sanlock is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601721" version="1" comment="libvirt-nss is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166269" version="1" comment="libvirt-nss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601722" version="1" comment="wireshark-plugin-libvirt is &lt;5.1.0-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223340" version="1" comment="wireshark-plugin-libvirt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609726" version="1" comment="pdns is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152980" version="1" comment="pdns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562499" version="1" comment="pdns-backend-geoip is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167901" version="1" comment="pdns-backend-geoip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609727" version="1" comment="pdns-backend-godbc is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167902" version="1" comment="pdns-backend-godbc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609728" version="1" comment="pdns-backend-ldap is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152981" version="1" comment="pdns-backend-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609729" version="1" comment="pdns-backend-lua is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152982" version="1" comment="pdns-backend-lua is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609730" version="1" comment="pdns-backend-mydns is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152983" version="1" comment="pdns-backend-mydns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609731" version="1" comment="pdns-backend-mysql is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152984" version="1" comment="pdns-backend-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609732" version="1" comment="pdns-backend-postgresql is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152985" version="1" comment="pdns-backend-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609733" version="1" comment="pdns-backend-remote is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167903" version="1" comment="pdns-backend-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609734" version="1" comment="pdns-backend-sqlite3 is &lt;4.1.8-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152986" version="1" comment="pdns-backend-sqlite3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601866" version="1" comment="libecpg6 is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601868" version="1" comment="libpq5 is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601870" version="1" comment="postgresql10 is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601871" version="1" comment="postgresql10-contrib is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601872" version="1" comment="postgresql10-devel is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601873" version="1" comment="postgresql10-docs is &lt;10.9-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601874" version="1" comment="postgresql10-plperl is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601875" version="1" comment="postgresql10-plpython is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601876" version="1" comment="postgresql10-pltcl is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601877" version="1" comment="postgresql10-server is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601878" version="1" comment="postgresql10-test is &lt;10.9-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602723" version="1" comment="ctdb is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152996" version="1" comment="ctdb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602724" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233089" version="1" comment="ctdb-pcp-pmda is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602725" version="1" comment="ctdb-tests is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152998" version="1" comment="ctdb-tests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602726" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151262" version="1" comment="libdcerpc-binding0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602727" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151263" version="1" comment="libdcerpc-binding0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602728" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152727" version="1" comment="libdcerpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602729" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152728" version="1" comment="libdcerpc-samr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602730" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152729" version="1" comment="libdcerpc-samr0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602731" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152730" version="1" comment="libdcerpc-samr0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602732" version="1" comment="libdcerpc0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151264" version="1" comment="libdcerpc0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602733" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151265" version="1" comment="libdcerpc0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602734" version="1" comment="libndr-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152735" version="1" comment="libndr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602735" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152736" version="1" comment="libndr-krb5pac-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602736" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151268" version="1" comment="libndr-krb5pac0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602737" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151269" version="1" comment="libndr-krb5pac0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602738" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152737" version="1" comment="libndr-nbt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602739" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151270" version="1" comment="libndr-nbt0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602740" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151271" version="1" comment="libndr-nbt0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602741" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152738" version="1" comment="libndr-standard-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602742" version="1" comment="libndr-standard0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151272" version="1" comment="libndr-standard0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602743" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151273" version="1" comment="libndr-standard0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602744" version="1" comment="libndr0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151274" version="1" comment="libndr0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602745" version="1" comment="libndr0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151275" version="1" comment="libndr0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602746" version="1" comment="libnetapi-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152739" version="1" comment="libnetapi-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602747" version="1" comment="libnetapi0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151276" version="1" comment="libnetapi0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602748" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151277" version="1" comment="libnetapi0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602749" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152742" version="1" comment="libsamba-credentials-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602750" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151279" version="1" comment="libsamba-credentials0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602751" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151280" version="1" comment="libsamba-credentials0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602752" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154222" version="1" comment="libsamba-errors-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602753" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154085" version="1" comment="libsamba-errors0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602754" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154086" version="1" comment="libsamba-errors0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602755" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152743" version="1" comment="libsamba-hostconfig-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602756" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151281" version="1" comment="libsamba-hostconfig0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602757" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151282" version="1" comment="libsamba-hostconfig0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602758" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152744" version="1" comment="libsamba-passdb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602759" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151283" version="1" comment="libsamba-passdb0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602760" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151284" version="1" comment="libsamba-passdb0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602761" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152745" version="1" comment="libsamba-policy-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602762" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266817" version="1" comment="libsamba-policy-python-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602763" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266818" version="1" comment="libsamba-policy-python3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602764" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152746" version="1" comment="libsamba-policy0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602765" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152747" version="1" comment="libsamba-policy0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602766" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266819" version="1" comment="libsamba-policy0-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602767" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266820" version="1" comment="libsamba-policy0-python3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602768" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152748" version="1" comment="libsamba-util-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602769" version="1" comment="libsamba-util0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151285" version="1" comment="libsamba-util0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602770" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151286" version="1" comment="libsamba-util0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602771" version="1" comment="libsamdb-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152749" version="1" comment="libsamdb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602772" version="1" comment="libsamdb0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151287" version="1" comment="libsamdb0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602773" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151288" version="1" comment="libsamdb0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602774" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151289" version="1" comment="libsmbclient-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602775" version="1" comment="libsmbclient0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151292" version="1" comment="libsmbclient0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602776" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152751" version="1" comment="libsmbclient0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602777" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152752" version="1" comment="libsmbconf-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602778" version="1" comment="libsmbconf0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151293" version="1" comment="libsmbconf0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602779" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151294" version="1" comment="libsmbconf0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602780" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152753" version="1" comment="libsmbldap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602781" version="1" comment="libsmbldap2 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177162" version="1" comment="libsmbldap2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602782" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233090" version="1" comment="libsmbldap2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602783" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152761" version="1" comment="libtevent-util-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602784" version="1" comment="libtevent-util0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151297" version="1" comment="libtevent-util0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602785" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151298" version="1" comment="libtevent-util0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602786" version="1" comment="libwbclient-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152764" version="1" comment="libwbclient-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602787" version="1" comment="libwbclient0 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151299" version="1" comment="libwbclient0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602788" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151300" version="1" comment="libwbclient0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602789" version="1" comment="samba is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151301" version="1" comment="samba is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602790" version="1" comment="samba-ad-dc is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266821" version="1" comment="samba-ad-dc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602791" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266822" version="1" comment="samba-ad-dc-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602792" version="1" comment="samba-ceph is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162650" version="1" comment="samba-ceph is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602793" version="1" comment="samba-client is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151303" version="1" comment="samba-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602794" version="1" comment="samba-client-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151304" version="1" comment="samba-client-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602795" version="1" comment="samba-core-devel is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152775" version="1" comment="samba-core-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602796" version="1" comment="samba-doc is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151305" version="1" comment="samba-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602797" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177163" version="1" comment="samba-dsdb-modules is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602798" version="1" comment="samba-libs is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151306" version="1" comment="samba-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602799" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151307" version="1" comment="samba-libs-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602800" version="1" comment="samba-libs-python is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266823" version="1" comment="samba-libs-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602801" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266824" version="1" comment="samba-libs-python-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602802" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266825" version="1" comment="samba-libs-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602803" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266826" version="1" comment="samba-libs-python3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602804" version="1" comment="samba-pidl is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152776" version="1" comment="samba-pidl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602805" version="1" comment="samba-python is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152777" version="1" comment="samba-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602806" version="1" comment="samba-python3 is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266827" version="1" comment="samba-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602807" version="1" comment="samba-test is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152778" version="1" comment="samba-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602808" version="1" comment="samba-winbind is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151308" version="1" comment="samba-winbind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602809" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.187.71edee57d5a-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151309" version="1" comment="samba-winbind-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607522" version="1" comment="ansible is &lt;2.9.6-lp151.2.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607523" version="1" comment="ansible-doc is &lt;2.9.6-lp151.2.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281504" version="1" comment="ansible-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607524" version="1" comment="ansible-test is &lt;2.9.6-lp151.2.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281505" version="1" comment="ansible-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602620" version="1" comment="libecpg6-32bit is &lt;10.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602622" version="1" comment="libpq5-32bit is &lt;10.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606505" version="1" comment="buildah is &lt;1.17.0-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266828" version="1" comment="buildah is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602810" version="1" comment="podman is &lt;1.4.4-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602811" version="1" comment="podman-cni-config is &lt;1.4.4-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607232" version="1" comment="skopeo is &lt;0.1.41-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265412" version="1" comment="skopeo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602718" version="1" comment="ghostscript is &lt;9.26a-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151933" version="1" comment="ghostscript is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602719" version="1" comment="ghostscript-devel is &lt;9.26a-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151934" version="1" comment="ghostscript-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602720" version="1" comment="ghostscript-mini is &lt;9.26a-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151935" version="1" comment="ghostscript-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602721" version="1" comment="ghostscript-mini-devel is &lt;9.26a-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151936" version="1" comment="ghostscript-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602722" version="1" comment="ghostscript-x11 is &lt;9.26a-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151937" version="1" comment="ghostscript-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603497" version="1" comment="ctdb is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603498" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603499" version="1" comment="ctdb-tests is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603500" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603501" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603502" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603503" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603504" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603505" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603506" version="1" comment="libdcerpc0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603507" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603508" version="1" comment="libndr-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603509" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603510" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603511" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603512" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603513" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603514" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603515" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603516" version="1" comment="libndr-standard0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603517" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603518" version="1" comment="libndr0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603519" version="1" comment="libndr0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603520" version="1" comment="libnetapi-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603521" version="1" comment="libnetapi0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603522" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603523" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603524" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603525" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603526" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603527" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603528" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603529" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603530" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603531" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603532" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603533" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603534" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603535" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603536" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603537" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603538" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603539" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603540" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603541" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603542" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603543" version="1" comment="libsamba-util0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603544" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603545" version="1" comment="libsamdb-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603546" version="1" comment="libsamdb0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603547" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603548" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603549" version="1" comment="libsmbclient0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603550" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603551" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603552" version="1" comment="libsmbconf0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603553" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603554" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603555" version="1" comment="libsmbldap2 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603556" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603557" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603558" version="1" comment="libtevent-util0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603559" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603560" version="1" comment="libwbclient-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603561" version="1" comment="libwbclient0 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603562" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603563" version="1" comment="samba is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603564" version="1" comment="samba-ad-dc is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603565" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603566" version="1" comment="samba-ceph is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603567" version="1" comment="samba-client is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603568" version="1" comment="samba-client-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603569" version="1" comment="samba-core-devel is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603570" version="1" comment="samba-doc is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603571" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603572" version="1" comment="samba-libs is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603573" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603574" version="1" comment="samba-libs-python is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603575" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603576" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603577" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603578" version="1" comment="samba-pidl is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603579" version="1" comment="samba-python is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603580" version="1" comment="samba-python3 is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603581" version="1" comment="samba-test is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603582" version="1" comment="samba-winbind is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603583" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.210.ab0549acb05-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609468" version="1" comment="messagelib is &lt;18.12.3-lp151.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157848" version="1" comment="messagelib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609469" version="1" comment="messagelib-devel is &lt;18.12.3-lp151.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157849" version="1" comment="messagelib-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609470" version="1" comment="messagelib-lang is &lt;18.12.3-lp151.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241457" version="1" comment="messagelib-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609735" version="1" comment="roundcubemail is &lt;1.3.15-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152670" version="1" comment="roundcubemail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609736" version="1" comment="python3-httpie is &lt;1.0.3-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266830" version="1" comment="python3-httpie is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601289" version="1" comment="graphviz is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601290" version="1" comment="graphviz-devel is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601291" version="1" comment="graphviz-doc is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601292" version="1" comment="graphviz-gd is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601293" version="1" comment="graphviz-gnome is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601294" version="1" comment="graphviz-guile is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601295" version="1" comment="graphviz-gvedit is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601296" version="1" comment="graphviz-java is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601297" version="1" comment="graphviz-lua is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601298" version="1" comment="graphviz-perl is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601299" version="1" comment="graphviz-php is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601300" version="1" comment="graphviz-plugins-core is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601301" version="1" comment="graphviz-python is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601302" version="1" comment="graphviz-ruby is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601303" version="1" comment="graphviz-smyrna is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601304" version="1" comment="graphviz-tcl is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601305" version="1" comment="libgraphviz6 is &lt;2.40.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609737" version="1" comment="php7-imagick is &lt;3.4.4-lp151.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275705" version="1" comment="php7-imagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601884" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601885" version="1" comment="php7 is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601886" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601887" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601888" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601889" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601890" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601891" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601892" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601893" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601894" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601895" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601896" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601897" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601898" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601899" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601900" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601901" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601902" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601903" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601904" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601905" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601906" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601907" version="1" comment="php7-json is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601908" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601909" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601910" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601911" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601912" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601913" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601914" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601915" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601916" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601917" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601918" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601919" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601920" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601921" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601922" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601923" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601924" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601925" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601926" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601927" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601928" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601929" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601930" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601931" version="1" comment="php7-testresults is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601932" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601933" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601934" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601935" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601936" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601937" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601938" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601939" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601940" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603177" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603178" version="1" comment="php7 is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603179" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603180" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603181" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603182" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603183" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603184" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603185" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603186" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603187" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603188" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603189" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603190" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603191" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603192" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603193" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603194" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603195" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603196" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603197" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603198" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603199" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603200" version="1" comment="php7-json is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603201" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603202" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603203" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603204" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603205" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603206" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603207" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603208" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603209" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603210" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603211" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603212" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603213" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603214" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603215" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603216" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603217" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603218" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603219" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603220" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603221" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603222" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603223" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603224" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603225" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603226" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603227" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603228" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603229" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603230" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603231" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603232" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603440" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603441" version="1" comment="php7 is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603442" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603443" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603444" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603445" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603446" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603447" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603448" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603449" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603450" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603451" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603452" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603453" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603454" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603455" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603456" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603457" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603458" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603459" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603460" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603461" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603462" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603463" version="1" comment="php7-json is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603464" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603465" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603466" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603467" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603468" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603469" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603470" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603471" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603472" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603473" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603474" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603475" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603476" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603477" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603478" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603479" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603480" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603481" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603482" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603483" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603484" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603485" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603486" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603487" version="1" comment="php7-test is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270016" version="1" comment="php7-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603488" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603489" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603490" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603491" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603492" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603493" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603494" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603495" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603496" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608484" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608485" version="1" comment="php7 is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608486" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608487" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608488" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608489" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608490" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608491" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608492" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608493" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608494" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608495" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608496" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608497" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608498" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608499" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608500" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608501" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608502" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608503" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608504" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608505" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608506" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608507" version="1" comment="php7-json is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608508" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608509" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608510" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608511" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608512" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608513" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608514" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608515" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608516" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608517" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608518" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608519" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608520" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608521" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608522" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608523" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608524" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608525" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608526" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608527" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608528" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608529" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608530" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608531" version="1" comment="php7-test is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608532" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608533" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608534" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608535" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608536" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608537" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608538" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608539" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608540" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608917" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608918" version="1" comment="php7 is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608919" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608920" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608921" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608922" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608923" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608924" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608925" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608926" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608927" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608928" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608929" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608930" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608931" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608932" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608933" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608934" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608935" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608936" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608937" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608938" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608939" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608940" version="1" comment="php7-json is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608941" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608942" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608943" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608944" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608945" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608946" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608947" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608948" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608949" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608950" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608951" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608952" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608953" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608954" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608955" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608956" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608957" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608958" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608959" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608960" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608961" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608962" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608963" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608964" version="1" comment="php7-test is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608965" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608966" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608967" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608968" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608969" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608970" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608971" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608972" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608973" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606172" version="1" comment="u-boot-tools is &lt;2019.01-lp151.6.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267105" version="1" comment="u-boot-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601283" version="1" comment="libxslt-devel is &lt;1.1.32-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155744" version="1" comment="libxslt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601284" version="1" comment="libxslt-devel-32bit is &lt;1.1.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155745" version="1" comment="libxslt-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601285" version="1" comment="libxslt-python is &lt;1.1.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155746" version="1" comment="libxslt-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601286" version="1" comment="libxslt-tools is &lt;1.1.32-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155747" version="1" comment="libxslt-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601287" version="1" comment="libxslt1 is &lt;1.1.32-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155748" version="1" comment="libxslt1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601288" version="1" comment="libxslt1-32bit is &lt;1.1.32-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155749" version="1" comment="libxslt1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602021" version="1" comment="rmt-server is &lt;2.3.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244412" version="1" comment="rmt-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602022" version="1" comment="rmt-server-config is &lt;2.3.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266831" version="1" comment="rmt-server-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602023" version="1" comment="rmt-server-pubcloud is &lt;2.3.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244413" version="1" comment="rmt-server-pubcloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603724" version="1" comment="ucode-intel is &lt;20191112a-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607547" version="1" comment="freeradius-server is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157108" version="1" comment="freeradius-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607548" version="1" comment="freeradius-server-devel is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157109" version="1" comment="freeradius-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607549" version="1" comment="freeradius-server-doc is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157110" version="1" comment="freeradius-server-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607550" version="1" comment="freeradius-server-krb5 is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157111" version="1" comment="freeradius-server-krb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607551" version="1" comment="freeradius-server-ldap is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157112" version="1" comment="freeradius-server-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607552" version="1" comment="freeradius-server-libs is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157113" version="1" comment="freeradius-server-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607553" version="1" comment="freeradius-server-mysql is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157114" version="1" comment="freeradius-server-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607554" version="1" comment="freeradius-server-perl is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157115" version="1" comment="freeradius-server-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607555" version="1" comment="freeradius-server-postgresql is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157116" version="1" comment="freeradius-server-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607556" version="1" comment="freeradius-server-python is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157117" version="1" comment="freeradius-server-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607557" version="1" comment="freeradius-server-sqlite is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157118" version="1" comment="freeradius-server-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607558" version="1" comment="freeradius-server-utils is &lt;3.0.16-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157119" version="1" comment="freeradius-server-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602712" version="1" comment="python2-urllib3 is &lt;1.24-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009264573" version="1" comment="python2-urllib3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602713" version="1" comment="python2-urllib3-test is &lt;1.24-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266833" version="1" comment="python2-urllib3-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602714" version="1" comment="python3-urllib3 is &lt;1.24-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177231" version="1" comment="python3-urllib3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602715" version="1" comment="python3-urllib3-test is &lt;1.24-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266834" version="1" comment="python3-urllib3-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604366" version="1" comment="singularity is &lt;3.6.0-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238040" version="1" comment="singularity is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602031" version="1" comment="python3-Django is &lt;2.2.4-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173965" version="1" comment="python3-Django is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601635" version="1" comment="evince is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601636" version="1" comment="evince-devel is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601637" version="1" comment="evince-lang is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601638" version="1" comment="evince-plugin-comicsdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601639" version="1" comment="evince-plugin-djvudocument is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601640" version="1" comment="evince-plugin-dvidocument is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601641" version="1" comment="evince-plugin-pdfdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601642" version="1" comment="evince-plugin-psdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601643" version="1" comment="evince-plugin-tiffdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601644" version="1" comment="evince-plugin-xpsdocument is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601645" version="1" comment="libevdocument3-4 is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601646" version="1" comment="libevview3-3 is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601647" version="1" comment="nautilus-evince is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601648" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601649" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.26.0+20180128.1bd86963-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601584" version="1" comment="ImageMagick is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151674" version="1" comment="ImageMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601585" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252941" version="1" comment="ImageMagick-config-7-SUSE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601586" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252942" version="1" comment="ImageMagick-config-7-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601587" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151675" version="1" comment="ImageMagick-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601588" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152592" version="1" comment="ImageMagick-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601589" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp151.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151676" version="1" comment="ImageMagick-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601590" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151677" version="1" comment="ImageMagick-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601591" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177175" version="1" comment="libMagick++-7_Q16HDRI4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601592" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231080" version="1" comment="libMagick++-7_Q16HDRI4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601593" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152596" version="1" comment="libMagick++-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601594" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152597" version="1" comment="libMagick++-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601595" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177176" version="1" comment="libMagickCore-7_Q16HDRI6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601596" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231081" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601597" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177177" version="1" comment="libMagickWand-7_Q16HDRI6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601598" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231082" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601599" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151681" version="1" comment="perl-PerlMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603234" version="1" comment="dovecot23 is &lt;2.3.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245304" version="1" comment="dovecot23 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603235" version="1" comment="dovecot23-backend-mysql is &lt;2.3.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245305" version="1" comment="dovecot23-backend-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603236" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245306" version="1" comment="dovecot23-backend-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603237" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245307" version="1" comment="dovecot23-backend-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603238" version="1" comment="dovecot23-devel is &lt;2.3.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245308" version="1" comment="dovecot23-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603239" version="1" comment="dovecot23-fts is &lt;2.3.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245309" version="1" comment="dovecot23-fts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603240" version="1" comment="dovecot23-fts-lucene is &lt;2.3.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245310" version="1" comment="dovecot23-fts-lucene is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603241" version="1" comment="dovecot23-fts-solr is &lt;2.3.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245311" version="1" comment="dovecot23-fts-solr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603242" version="1" comment="dovecot23-fts-squat is &lt;2.3.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245312" version="1" comment="dovecot23-fts-squat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605732" version="1" comment="pagure is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297553" version="1" comment="pagure is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605733" version="1" comment="pagure-ci is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297554" version="1" comment="pagure-ci is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605734" version="1" comment="pagure-ev is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297555" version="1" comment="pagure-ev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605735" version="1" comment="pagure-loadjson is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297556" version="1" comment="pagure-loadjson is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605736" version="1" comment="pagure-logcom is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297557" version="1" comment="pagure-logcom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605737" version="1" comment="pagure-milters is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297558" version="1" comment="pagure-milters is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605738" version="1" comment="pagure-mirror is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297559" version="1" comment="pagure-mirror is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605739" version="1" comment="pagure-theme-chameleon is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297560" version="1" comment="pagure-theme-chameleon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605740" version="1" comment="pagure-theme-default-openSUSE is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297561" version="1" comment="pagure-theme-default-openSUSE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605741" version="1" comment="pagure-theme-default-upstream is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297562" version="1" comment="pagure-theme-default-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605742" version="1" comment="pagure-theme-pagureio is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297563" version="1" comment="pagure-theme-pagureio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605743" version="1" comment="pagure-theme-srcfpo is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297564" version="1" comment="pagure-theme-srcfpo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605744" version="1" comment="pagure-theme-upstream is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297565" version="1" comment="pagure-theme-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605745" version="1" comment="pagure-webhook is &lt;5.5-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297566" version="1" comment="pagure-webhook is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608183" version="1" comment="memcached is &lt;1.5.6-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153862" version="1" comment="memcached is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608184" version="1" comment="memcached-devel is &lt;1.5.6-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153863" version="1" comment="memcached-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601973" version="1" comment="ImageMagick is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601974" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601975" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601976" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601977" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601978" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp151.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601979" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601980" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601981" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601982" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601983" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601984" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601985" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601986" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601987" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601988" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp151.7.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601605" version="1" comment="MozillaThunderbird is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151180" version="1" comment="MozillaThunderbird is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601606" version="1" comment="MozillaThunderbird-buildsymbols is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152803" version="1" comment="MozillaThunderbird-buildsymbols is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601607" version="1" comment="MozillaThunderbird-translations-common is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151181" version="1" comment="MozillaThunderbird-translations-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601608" version="1" comment="MozillaThunderbird-translations-other is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152805" version="1" comment="MozillaThunderbird-translations-other is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601578" version="1" comment="MozillaFirefox is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151161" version="1" comment="MozillaFirefox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601579" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152806" version="1" comment="MozillaFirefox-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601580" version="1" comment="MozillaFirefox-buildsymbols is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152807" version="1" comment="MozillaFirefox-buildsymbols is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601581" version="1" comment="MozillaFirefox-devel is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152808" version="1" comment="MozillaFirefox-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601582" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151162" version="1" comment="MozillaFirefox-translations-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601583" version="1" comment="MozillaFirefox-translations-other is &lt;60.7.2-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152809" version="1" comment="MozillaFirefox-translations-other is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601948" version="1" comment="MozillaFirefox is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601949" version="1" comment="MozillaFirefox-branding-upstream is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601950" version="1" comment="MozillaFirefox-buildsymbols is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601951" version="1" comment="MozillaFirefox-devel is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601952" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601953" version="1" comment="MozillaFirefox-translations-other is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603132" version="1" comment="MozillaThunderbird is &lt;68.1.1-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603133" version="1" comment="MozillaThunderbird-buildsymbols is &lt;68.1.1-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603134" version="1" comment="MozillaThunderbird-translations-common is &lt;68.1.1-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603135" version="1" comment="MozillaThunderbird-translations-other is &lt;68.1.1-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603136" version="1" comment="enigmail is &lt;2.1.2-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009176167" version="1" comment="enigmail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601954" version="1" comment="libfreebl3 is &lt;3.44.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601955" version="1" comment="libfreebl3-32bit is &lt;3.44.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601956" version="1" comment="libfreebl3-hmac is &lt;3.44.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601957" version="1" comment="libfreebl3-hmac-32bit is &lt;3.44.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601958" version="1" comment="libsoftokn3 is &lt;3.44.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601959" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601960" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601961" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.44.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601962" version="1" comment="mozilla-nss is &lt;3.44.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601963" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601964" version="1" comment="mozilla-nss-certs is &lt;3.44.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601965" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601966" version="1" comment="mozilla-nss-devel is &lt;3.44.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601967" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601968" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601969" version="1" comment="mozilla-nss-tools is &lt;3.44.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603137" version="1" comment="MozillaFirefox is &lt;68.1.0-lp151.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603138" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.1.0-lp151.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603139" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.1.0-lp151.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603140" version="1" comment="MozillaFirefox-devel is &lt;68.1.0-lp151.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603141" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-lp151.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603142" version="1" comment="MozillaFirefox-translations-other is &lt;68.1.0-lp151.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606217" version="1" comment="MozillaFirefox is &lt;68.3.0-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606218" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.3.0-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606219" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.3.0-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606220" version="1" comment="MozillaFirefox-devel is &lt;68.3.0-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606221" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606222" version="1" comment="MozillaFirefox-translations-other is &lt;68.3.0-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607008" version="1" comment="MozillaThunderbird is &lt;68.3.0-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607009" version="1" comment="MozillaThunderbird-translations-common is &lt;68.3.0-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607010" version="1" comment="MozillaThunderbird-translations-other is &lt;68.3.0-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603605" version="1" comment="MozillaFirefox is &lt;68.2.0-lp151.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603606" version="1" comment="MozillaFirefox-branding-openSUSE is &lt;68-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270406" version="1" comment="MozillaFirefox-branding-openSUSE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603607" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.2.0-lp151.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603608" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.2.0-lp151.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603609" version="1" comment="MozillaFirefox-devel is &lt;68.2.0-lp151.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603610" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-lp151.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603611" version="1" comment="MozillaFirefox-translations-other is &lt;68.2.0-lp151.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603613" version="1" comment="MozillaThunderbird is &lt;68.2.1-lp151.2.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603614" version="1" comment="MozillaThunderbird-translations-common is &lt;68.2.1-lp151.2.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603615" version="1" comment="MozillaThunderbird-translations-other is &lt;68.2.1-lp151.2.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603612" version="1" comment="firefox-esr-branding-openSUSE is &lt;68-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270407" version="1" comment="firefox-esr-branding-openSUSE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609738" version="1" comment="phpMyAdmin is &lt;4.9.0.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153097" version="1" comment="phpMyAdmin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603055" version="1" comment="libmosquitto1 is &lt;1.5.7-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244945" version="1" comment="libmosquitto1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603056" version="1" comment="libmosquittopp1 is &lt;1.5.7-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244946" version="1" comment="libmosquittopp1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603057" version="1" comment="mosquitto is &lt;1.5.7-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244947" version="1" comment="mosquitto is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603058" version="1" comment="mosquitto-clients is &lt;1.5.7-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244948" version="1" comment="mosquitto-clients is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603059" version="1" comment="mosquitto-devel is &lt;1.5.7-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244949" version="1" comment="mosquitto-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602043" version="1" comment="libzstd-devel is &lt;1.4.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262523" version="1" comment="libzstd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602044" version="1" comment="libzstd-devel-static is &lt;1.4.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262524" version="1" comment="libzstd-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602045" version="1" comment="libzstd1 is &lt;1.4.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262525" version="1" comment="libzstd1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602046" version="1" comment="libzstd1-32bit is &lt;1.4.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266836" version="1" comment="libzstd1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602047" version="1" comment="zstd is &lt;1.4.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262526" version="1" comment="zstd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602543" version="1" comment="qemu is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602544" version="1" comment="qemu-arm is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602545" version="1" comment="qemu-audio-alsa is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602546" version="1" comment="qemu-audio-oss is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602547" version="1" comment="qemu-audio-pa is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602548" version="1" comment="qemu-audio-sdl is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602549" version="1" comment="qemu-block-curl is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602550" version="1" comment="qemu-block-dmg is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602551" version="1" comment="qemu-block-gluster is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602552" version="1" comment="qemu-block-iscsi is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602553" version="1" comment="qemu-block-nfs is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602554" version="1" comment="qemu-block-rbd is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602555" version="1" comment="qemu-block-ssh is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602556" version="1" comment="qemu-extra is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602557" version="1" comment="qemu-guest-agent is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602558" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp151.7.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602559" version="1" comment="qemu-ksm is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602560" version="1" comment="qemu-kvm is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602561" version="1" comment="qemu-lang is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602562" version="1" comment="qemu-linux-user is &lt;3.1.1-lp151.7.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602563" version="1" comment="qemu-ppc is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602564" version="1" comment="qemu-s390 is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602565" version="1" comment="qemu-seabios is &lt;1.12.0-lp151.7.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602566" version="1" comment="qemu-sgabios is &lt;8-lp151.7.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602567" version="1" comment="qemu-testsuite is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153020" version="1" comment="qemu-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602568" version="1" comment="qemu-tools is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602569" version="1" comment="qemu-ui-curses is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602570" version="1" comment="qemu-ui-gtk is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602571" version="1" comment="qemu-ui-sdl is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602572" version="1" comment="qemu-vgabios is &lt;1.12.0-lp151.7.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602573" version="1" comment="qemu-x86 is &lt;3.1.1-lp151.7.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601667" version="1" comment="libu2f-host-devel is &lt;1.1.6-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601668" version="1" comment="libu2f-host-doc is &lt;1.1.6-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601669" version="1" comment="libu2f-host0 is &lt;1.1.6-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601670" version="1" comment="pam_u2f is &lt;1.0.8-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260150" version="1" comment="pam_u2f is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601671" version="1" comment="u2f-host is &lt;1.1.6-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602642" version="1" comment="libSDL2_image-2_0-0 is &lt;2.0.5-lp151.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172246" version="1" comment="libSDL2_image-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602643" version="1" comment="libSDL2_image-2_0-0-32bit is &lt;2.0.5-lp151.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172247" version="1" comment="libSDL2_image-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602644" version="1" comment="libSDL2_image-devel is &lt;2.0.5-lp151.2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172248" version="1" comment="libSDL2_image-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602645" version="1" comment="libSDL2_image-devel-32bit is &lt;2.0.5-lp151.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172249" version="1" comment="libSDL2_image-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609739" version="1" comment="enigmail is &lt;2.0.11-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603843" version="1" comment="libidn2-0 is &lt;2.2.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177212" version="1" comment="libidn2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603844" version="1" comment="libidn2-0-32bit is &lt;2.2.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177213" version="1" comment="libidn2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603845" version="1" comment="libidn2-devel is &lt;2.2.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273025" version="1" comment="libidn2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603846" version="1" comment="libidn2-lang is &lt;2.2.0-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273026" version="1" comment="libidn2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603847" version="1" comment="libidn2-tools is &lt;2.2.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273027" version="1" comment="libidn2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601837" version="1" comment="python-Twisted-doc is &lt;17.9.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153552" version="1" comment="python-Twisted-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601838" version="1" comment="python2-Twisted is &lt;17.9.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260377" version="1" comment="python2-Twisted is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601839" version="1" comment="python3-Twisted is &lt;17.9.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260379" version="1" comment="python3-Twisted is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601727" version="1" comment="ctdb is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601728" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601729" version="1" comment="ctdb-tests is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601730" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601731" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601732" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601733" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601734" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601735" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601736" version="1" comment="libdcerpc0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601737" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601738" version="1" comment="libndr-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601739" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601740" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601741" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601742" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601743" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601744" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601745" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601746" version="1" comment="libndr-standard0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601747" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601748" version="1" comment="libndr0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601749" version="1" comment="libndr0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601750" version="1" comment="libnetapi-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601751" version="1" comment="libnetapi0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601752" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601753" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601754" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601755" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601756" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601757" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601758" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601759" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601760" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601761" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601762" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601763" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601764" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601765" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601766" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601767" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601768" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601769" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601770" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601771" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601772" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601773" version="1" comment="libsamba-util0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601774" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601775" version="1" comment="libsamdb-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601776" version="1" comment="libsamdb0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601777" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601778" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601779" version="1" comment="libsmbclient0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601780" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601781" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601782" version="1" comment="libsmbconf0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601783" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601784" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601785" version="1" comment="libsmbldap2 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601786" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601787" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601788" version="1" comment="libtevent-util0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601789" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601790" version="1" comment="libwbclient-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601791" version="1" comment="libwbclient0 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601792" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601793" version="1" comment="samba is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601794" version="1" comment="samba-ad-dc is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601795" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601796" version="1" comment="samba-ceph is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601797" version="1" comment="samba-client is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601798" version="1" comment="samba-client-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601799" version="1" comment="samba-core-devel is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601800" version="1" comment="samba-doc is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601801" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601802" version="1" comment="samba-libs is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601803" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601804" version="1" comment="samba-libs-python is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601805" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601806" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601807" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601808" version="1" comment="samba-pidl is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601809" version="1" comment="samba-python is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601810" version="1" comment="samba-python3 is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601811" version="1" comment="samba-test is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601812" version="1" comment="samba-winbind is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601813" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.176.375e1f05788-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601441" version="1" comment="bubblewrap is &lt;0.3.3-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177243" version="1" comment="bubblewrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601659" version="1" comment="gvfs is &lt;1.34.2.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245313" version="1" comment="gvfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601660" version="1" comment="gvfs-32bit is &lt;1.34.2.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245314" version="1" comment="gvfs-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601661" version="1" comment="gvfs-backend-afc is &lt;1.34.2.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245315" version="1" comment="gvfs-backend-afc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601662" version="1" comment="gvfs-backend-samba is &lt;1.34.2.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245316" version="1" comment="gvfs-backend-samba is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601663" version="1" comment="gvfs-backends is &lt;1.34.2.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245317" version="1" comment="gvfs-backends is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601664" version="1" comment="gvfs-devel is &lt;1.34.2.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245318" version="1" comment="gvfs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601665" version="1" comment="gvfs-fuse is &lt;1.34.2.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245319" version="1" comment="gvfs-fuse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601666" version="1" comment="gvfs-lang is &lt;1.34.2.1-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245320" version="1" comment="gvfs-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607858" version="1" comment="squid is &lt;4.11-lp151.2.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152563" version="1" comment="squid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603742" version="1" comment="squid is &lt;4.9-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609740" version="1" comment="dosbox is &lt;0.74.3-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261752" version="1" comment="dosbox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606756" version="1" comment="clamav is &lt;0.103.0-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151381" version="1" comment="clamav is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606757" version="1" comment="clamav-devel is &lt;0.103.0-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231589" version="1" comment="clamav-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603812" version="1" comment="libclamav7 is &lt;0.100.3-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231590" version="1" comment="libclamav7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606758" version="1" comment="libclamav9 is &lt;0.103.0-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339621" version="1" comment="libclamav9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603813" version="1" comment="libclammspack0 is &lt;0.100.3-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231591" version="1" comment="libclammspack0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606759" version="1" comment="libfreshclam2 is &lt;0.103.0-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339622" version="1" comment="libfreshclam2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601444" version="1" comment="gvim is &lt;8.0.1568-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151192" version="1" comment="gvim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601835" version="1" comment="neovim is &lt;0.3.7-lp151.2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256885" version="1" comment="neovim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601836" version="1" comment="neovim-lang is &lt;0.3.7-lp151.2.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256887" version="1" comment="neovim-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601445" version="1" comment="vim is &lt;8.0.1568-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151193" version="1" comment="vim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601446" version="1" comment="vim-data is &lt;8.0.1568-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151194" version="1" comment="vim-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601447" version="1" comment="vim-data-common is &lt;8.0.1568-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177135" version="1" comment="vim-data-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601672" version="1" comment="dbus-1 is &lt;1.12.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151535" version="1" comment="dbus-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601673" version="1" comment="dbus-1-devel is &lt;1.12.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151536" version="1" comment="dbus-1-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601674" version="1" comment="dbus-1-devel-32bit is &lt;1.12.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258222" version="1" comment="dbus-1-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601675" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258223" version="1" comment="dbus-1-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601676" version="1" comment="dbus-1-x11 is &lt;1.12.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151537" version="1" comment="dbus-1-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601677" version="1" comment="libdbus-1-3 is &lt;1.12.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151538" version="1" comment="libdbus-1-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601678" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151539" version="1" comment="libdbus-1-3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601682" version="1" comment="libqb-devel is &lt;1.0.3+20190326.a521604-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260152" version="1" comment="libqb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601683" version="1" comment="libqb-devel-32bit is &lt;1.0.3+20190326.a521604-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260153" version="1" comment="libqb-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601684" version="1" comment="libqb-tests is &lt;1.0.3+20190326.a521604-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266846" version="1" comment="libqb-tests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601685" version="1" comment="libqb-tools is &lt;1.0.3+20190326.a521604-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266847" version="1" comment="libqb-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601686" version="1" comment="libqb20 is &lt;1.0.3+20190326.a521604-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266848" version="1" comment="libqb20 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601687" version="1" comment="libqb20-32bit is &lt;1.0.3+20190326.a521604-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266849" version="1" comment="libqb20-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609741" version="1" comment="znc is &lt;1.7.4-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251916" version="1" comment="znc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609742" version="1" comment="znc-devel is &lt;1.7.4-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251918" version="1" comment="znc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609743" version="1" comment="znc-lang is &lt;1.7.4-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251920" version="1" comment="znc-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609744" version="1" comment="znc-perl is &lt;1.7.4-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251922" version="1" comment="znc-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609745" version="1" comment="znc-python3 is &lt;1.7.4-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251924" version="1" comment="znc-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609746" version="1" comment="znc-tcl is &lt;1.7.4-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251926" version="1" comment="znc-tcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608980" version="1" comment="libpmi0 is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230283" version="1" comment="libpmi0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608981" version="1" comment="libslurm33 is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266850" version="1" comment="libslurm33 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608982" version="1" comment="perl-slurm is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230285" version="1" comment="perl-slurm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608983" version="1" comment="slurm is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230286" version="1" comment="slurm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608984" version="1" comment="slurm-auth-none is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230287" version="1" comment="slurm-auth-none is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608985" version="1" comment="slurm-config is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230288" version="1" comment="slurm-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608986" version="1" comment="slurm-config-man is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266851" version="1" comment="slurm-config-man is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608987" version="1" comment="slurm-cray is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266852" version="1" comment="slurm-cray is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608988" version="1" comment="slurm-devel is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230289" version="1" comment="slurm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608989" version="1" comment="slurm-doc is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230290" version="1" comment="slurm-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608990" version="1" comment="slurm-hdf5 is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266853" version="1" comment="slurm-hdf5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608991" version="1" comment="slurm-lua is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230291" version="1" comment="slurm-lua is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608992" version="1" comment="slurm-munge is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230292" version="1" comment="slurm-munge is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608993" version="1" comment="slurm-node is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230293" version="1" comment="slurm-node is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608994" version="1" comment="slurm-openlava is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230294" version="1" comment="slurm-openlava is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608995" version="1" comment="slurm-pam_slurm is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230295" version="1" comment="slurm-pam_slurm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608996" version="1" comment="slurm-plugins is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230296" version="1" comment="slurm-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608997" version="1" comment="slurm-seff is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230297" version="1" comment="slurm-seff is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608998" version="1" comment="slurm-sjstat is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230298" version="1" comment="slurm-sjstat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608999" version="1" comment="slurm-slurmdbd is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230299" version="1" comment="slurm-slurmdbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609000" version="1" comment="slurm-sql is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230300" version="1" comment="slurm-sql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609001" version="1" comment="slurm-sview is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230301" version="1" comment="slurm-sview is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609002" version="1" comment="slurm-torque is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230302" version="1" comment="slurm-torque is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609003" version="1" comment="slurm-webdoc is &lt;18.08.9-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276533" version="1" comment="slurm-webdoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602639" version="1" comment="python-Twisted-doc is &lt;17.9.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602640" version="1" comment="python2-Twisted is &lt;17.9.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602641" version="1" comment="python3-Twisted is &lt;17.9.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602138" version="1" comment="bzip2 is &lt;1.0.6-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602139" version="1" comment="bzip2-doc is &lt;1.0.6-lp151.5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602140" version="1" comment="libbz2-1 is &lt;1.0.6-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602141" version="1" comment="libbz2-1-32bit is &lt;1.0.6-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602142" version="1" comment="libbz2-devel is &lt;1.0.6-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602143" version="1" comment="libbz2-devel-32bit is &lt;1.0.6-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609747" version="1" comment="libgcrypt-cavs is &lt;1.8.2-lp151.9.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153048" version="1" comment="libgcrypt-cavs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609748" version="1" comment="libgcrypt-devel is &lt;1.8.2-lp151.9.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151920" version="1" comment="libgcrypt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609749" version="1" comment="libgcrypt-devel-32bit is &lt;1.8.2-lp151.9.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153049" version="1" comment="libgcrypt-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609750" version="1" comment="libgcrypt20 is &lt;1.8.2-lp151.9.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151921" version="1" comment="libgcrypt20 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609751" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-lp151.9.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151922" version="1" comment="libgcrypt20-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609752" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-lp151.9.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153050" version="1" comment="libgcrypt20-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609753" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-lp151.9.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153051" version="1" comment="libgcrypt20-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607322" version="1" comment="GraphicsMagick is &lt;1.3.29-lp151.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152591" version="1" comment="GraphicsMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607323" version="1" comment="GraphicsMagick-devel is &lt;1.3.29-lp151.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151256" version="1" comment="GraphicsMagick-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607324" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.29-lp151.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154127" version="1" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607325" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.29-lp151.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152594" version="1" comment="libGraphicsMagick++-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607326" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.29-lp151.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151257" version="1" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607327" version="1" comment="libGraphicsMagick3-config is &lt;1.3.29-lp151.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151258" version="1" comment="libGraphicsMagick3-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607328" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.29-lp151.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151259" version="1" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607329" version="1" comment="perl-GraphicsMagick is &lt;1.3.29-lp151.4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152600" version="1" comment="perl-GraphicsMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609754" version="1" comment="phpMyAdmin is &lt;4.9.4-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605845" version="1" comment="binutils is &lt;2.35-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605846" version="1" comment="binutils-devel is &lt;2.35-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605847" version="1" comment="binutils-devel-32bit is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605848" version="1" comment="binutils-gold is &lt;2.35-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605849" version="1" comment="cross-aarch64-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605850" version="1" comment="cross-arm-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605851" version="1" comment="cross-avr-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605852" version="1" comment="cross-epiphany-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605853" version="1" comment="cross-hppa-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605854" version="1" comment="cross-hppa64-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605855" version="1" comment="cross-i386-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605856" version="1" comment="cross-ia64-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605857" version="1" comment="cross-m68k-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605858" version="1" comment="cross-mips-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605859" version="1" comment="cross-ppc-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605860" version="1" comment="cross-ppc64-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605861" version="1" comment="cross-ppc64le-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605862" version="1" comment="cross-riscv64-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605863" version="1" comment="cross-rx-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605864" version="1" comment="cross-s390-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605865" version="1" comment="cross-s390x-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605866" version="1" comment="cross-sparc-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605867" version="1" comment="cross-sparc64-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605868" version="1" comment="cross-spu-binutils is &lt;2.35-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605869" version="1" comment="libctf-nobfd0 is &lt;2.35-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297779" version="1" comment="libctf-nobfd0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605870" version="1" comment="libctf0 is &lt;2.35-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297780" version="1" comment="libctf0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603086" version="1" comment="ghostscript is &lt;9.27-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603087" version="1" comment="ghostscript-devel is &lt;9.27-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603088" version="1" comment="ghostscript-mini is &lt;9.27-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603089" version="1" comment="ghostscript-mini-devel is &lt;9.27-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603090" version="1" comment="ghostscript-x11 is &lt;9.27-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602490" version="1" comment="ImageMagick is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602491" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602492" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602493" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602494" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp151.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602495" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp151.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602496" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602497" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602498" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp151.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602499" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602500" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp151.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602501" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602502" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602503" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602504" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602505" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp151.7.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609755" version="1" comment="irssi is &lt;1.1.3-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151315" version="1" comment="irssi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609756" version="1" comment="irssi-devel is &lt;1.1.3-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153798" version="1" comment="irssi-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602136" version="1" comment="gpg2 is &lt;2.2.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151446" version="1" comment="gpg2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602137" version="1" comment="gpg2-lang is &lt;2.2.5-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151447" version="1" comment="gpg2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603115" version="1" comment="u-boot-tools is &lt;2019.01-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608185" version="1" comment="libxslt-devel is &lt;1.1.32-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608186" version="1" comment="libxslt-devel-32bit is &lt;1.1.32-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608187" version="1" comment="libxslt-python is &lt;1.1.32-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608188" version="1" comment="libxslt-tools is &lt;1.1.32-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608189" version="1" comment="libxslt1 is &lt;1.1.32-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608190" version="1" comment="libxslt1-32bit is &lt;1.1.32-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601853" version="1" comment="libzmq5 is &lt;4.2.3-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243098" version="1" comment="libzmq5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601854" version="1" comment="zeromq-devel is &lt;4.2.3-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243101" version="1" comment="zeromq-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601855" version="1" comment="zeromq-tools is &lt;4.2.3-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243102" version="1" comment="zeromq-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602048" version="1" comment="nodejs10 is &lt;10.16.0-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251313" version="1" comment="nodejs10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602049" version="1" comment="nodejs10-devel is &lt;10.16.0-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251314" version="1" comment="nodejs10-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602050" version="1" comment="nodejs10-docs is &lt;10.16.0-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251315" version="1" comment="nodejs10-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602071" version="1" comment="nodejs8 is &lt;8.15.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230278" version="1" comment="nodejs8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602072" version="1" comment="nodejs8-devel is &lt;8.15.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230279" version="1" comment="nodejs8-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602073" version="1" comment="nodejs8-docs is &lt;8.15.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230280" version="1" comment="nodejs8-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602051" version="1" comment="npm10 is &lt;10.16.0-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251316" version="1" comment="npm10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602074" version="1" comment="npm8 is &lt;8.15.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230281" version="1" comment="npm8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603856" version="1" comment="calamares is &lt;3.2.15-lp151.4.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273029" version="1" comment="calamares is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603857" version="1" comment="calamares-branding-upstream is &lt;3.2.15-lp151.4.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273031" version="1" comment="calamares-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603858" version="1" comment="calamares-webview is &lt;3.2.15-lp151.4.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273033" version="1" comment="calamares-webview is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609757" version="1" comment="nsd is &lt;4.1.27-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338518" version="1" comment="nsd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606010" version="1" comment="python2-virt-bootstrap is &lt;1.0.0-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297785" version="1" comment="python2-virt-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606011" version="1" comment="python3-virt-bootstrap is &lt;1.0.0-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297786" version="1" comment="python3-virt-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607602" version="1" comment="freeradius-server is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607603" version="1" comment="freeradius-server-devel is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607604" version="1" comment="freeradius-server-doc is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607605" version="1" comment="freeradius-server-krb5 is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607606" version="1" comment="freeradius-server-ldap is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607607" version="1" comment="freeradius-server-libs is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607608" version="1" comment="freeradius-server-mysql is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607609" version="1" comment="freeradius-server-perl is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607610" version="1" comment="freeradius-server-postgresql is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607611" version="1" comment="freeradius-server-python is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607612" version="1" comment="freeradius-server-sqlite is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607613" version="1" comment="freeradius-server-utils is &lt;3.0.16-lp151.4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604916" version="1" comment="perl-Authen-SASL is &lt;2.16-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277151" version="1" comment="perl-Authen-SASL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604917" version="1" comment="perl-Net-SMTP-SSL is &lt;1.04-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277152" version="1" comment="perl-Net-SMTP-SSL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608202" version="1" comment="freetds-config is &lt;1.1.36-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284105" version="1" comment="freetds-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608203" version="1" comment="freetds-devel is &lt;1.1.36-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284106" version="1" comment="freetds-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608204" version="1" comment="freetds-doc is &lt;1.1.36-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284107" version="1" comment="freetds-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608205" version="1" comment="freetds-tools is &lt;1.1.36-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284108" version="1" comment="freetds-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608206" version="1" comment="libct4 is &lt;1.1.36-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284109" version="1" comment="libct4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608207" version="1" comment="libsybdb5 is &lt;1.1.36-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284110" version="1" comment="libsybdb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608208" version="1" comment="libtdsodbc0 is &lt;1.1.36-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284111" version="1" comment="libtdsodbc0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607583" version="1" comment="libvlc5 is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607584" version="1" comment="libvlccore9 is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607585" version="1" comment="vlc is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607586" version="1" comment="vlc-codec-gstreamer is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607587" version="1" comment="vlc-devel is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607588" version="1" comment="vlc-jack is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607589" version="1" comment="vlc-lang is &lt;3.0.9.2-lp151.6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607590" version="1" comment="vlc-noX is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607591" version="1" comment="vlc-opencv is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281885" version="1" comment="vlc-opencv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607592" version="1" comment="vlc-qt is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607593" version="1" comment="vlc-vdpau is &lt;3.0.9.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606213" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251318" version="1" comment="libSDL-1_2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606214" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251319" version="1" comment="libSDL-1_2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606215" version="1" comment="libSDL-devel is &lt;1.2.15-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251320" version="1" comment="libSDL-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606216" version="1" comment="libSDL-devel-32bit is &lt;1.2.15-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251321" version="1" comment="libSDL-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603091" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166226" version="1" comment="libSDL2-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603092" version="1" comment="libSDL2-2_0-0-32bit is &lt;2.0.8-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166228" version="1" comment="libSDL2-2_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603093" version="1" comment="libSDL2-devel is &lt;2.0.8-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166230" version="1" comment="libSDL2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603094" version="1" comment="libSDL2-devel-32bit is &lt;2.0.8-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166232" version="1" comment="libSDL2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602646" version="1" comment="libSDL_image-1_2-0 is &lt;1.2.12+hg695-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172250" version="1" comment="libSDL_image-1_2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602647" version="1" comment="libSDL_image-1_2-0-32bit is &lt;1.2.12+hg695-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172251" version="1" comment="libSDL_image-1_2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602648" version="1" comment="libSDL_image-devel is &lt;1.2.12+hg695-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172252" version="1" comment="libSDL_image-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602649" version="1" comment="libSDL_image-devel-32bit is &lt;1.2.12+hg695-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172253" version="1" comment="libSDL_image-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602483" version="1" comment="libwireshark9 is &lt;2.4.16-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177715" version="1" comment="libwireshark9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602484" version="1" comment="libwiretap7 is &lt;2.4.16-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177716" version="1" comment="libwiretap7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602485" version="1" comment="libwscodecs1 is &lt;2.4.16-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177717" version="1" comment="libwscodecs1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602486" version="1" comment="libwsutil8 is &lt;2.4.16-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177718" version="1" comment="libwsutil8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606724" version="1" comment="libgcrypt-cavs is &lt;1.8.2-lp151.9.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606725" version="1" comment="libgcrypt-devel is &lt;1.8.2-lp151.9.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606726" version="1" comment="libgcrypt-devel-32bit is &lt;1.8.2-lp151.9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606727" version="1" comment="libgcrypt20 is &lt;1.8.2-lp151.9.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606728" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-lp151.9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606729" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-lp151.9.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606730" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-lp151.9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602526" version="1" comment="qbittorrent is &lt;4.1.5-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154048" version="1" comment="qbittorrent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602527" version="1" comment="qbittorrent-nox is &lt;4.1.5-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154049" version="1" comment="qbittorrent-nox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602823" version="1" comment="chromedriver is &lt;77.0.3865.75-lp151.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602824" version="1" comment="chromium is &lt;77.0.3865.75-lp151.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603018" version="1" comment="chromedriver is &lt;77.0.3865.90-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603019" version="1" comment="chromium is &lt;77.0.3865.90-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603298" version="1" comment="chromedriver is &lt;77.0.3865.120-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603299" version="1" comment="chromium is &lt;77.0.3865.120-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603392" version="1" comment="chromedriver is &lt;78.0.3904.70-lp151.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603393" version="1" comment="chromium is &lt;78.0.3904.70-lp151.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603394" version="1" comment="libre2-0 is &lt;20190901-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170670" version="1" comment="libre2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603395" version="1" comment="libre2-0-32bit is &lt;20190901-lp151.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170671" version="1" comment="libre2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603396" version="1" comment="re2-devel is &lt;20190901-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170673" version="1" comment="re2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603397" version="1" comment="chromedriver is &lt;78.0.3904.87-lp151.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603398" version="1" comment="chromium is &lt;78.0.3904.87-lp151.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603868" version="1" comment="opera is &lt;65.0.3467.62-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229703" version="1" comment="opera is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603743" version="1" comment="chromedriver is &lt;78.0.3904.108-lp151.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603744" version="1" comment="chromium is &lt;78.0.3904.108-lp151.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609758" version="1" comment="chromedriver is &lt;79.0.3945.79-lp151.2.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609759" version="1" comment="chromium is &lt;79.0.3945.79-lp151.2.51.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609760" version="1" comment="chromedriver is &lt;79.0.3945.88-lp151.2.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609761" version="1" comment="chromium is &lt;79.0.3945.88-lp151.2.54.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602001" version="1" comment="exim is &lt;4.88-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602002" version="1" comment="eximon is &lt;4.88-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602003" version="1" comment="eximstats-html is &lt;4.88-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603761" version="1" comment="haproxy is &lt;2.0.5+git0.d905f49a-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238038" version="1" comment="haproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603327" version="1" comment="cpp7 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268648" version="1" comment="cpp7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608126" version="1" comment="cpp9 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283950" version="1" comment="cpp9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608127" version="1" comment="cross-nvptx-gcc9 is &lt;9.3.1+git1296-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283951" version="1" comment="cross-nvptx-gcc9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608128" version="1" comment="cross-nvptx-newlib9-devel is &lt;9.3.1+git1296-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283952" version="1" comment="cross-nvptx-newlib9-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603328" version="1" comment="gcc7 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268649" version="1" comment="gcc7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603329" version="1" comment="gcc7-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268650" version="1" comment="gcc7-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603330" version="1" comment="gcc7-ada is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268651" version="1" comment="gcc7-ada is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603331" version="1" comment="gcc7-ada-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268652" version="1" comment="gcc7-ada-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603332" version="1" comment="gcc7-c++ is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268653" version="1" comment="gcc7-c++ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603333" version="1" comment="gcc7-c++-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268654" version="1" comment="gcc7-c++-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603334" version="1" comment="gcc7-fortran is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268655" version="1" comment="gcc7-fortran is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603335" version="1" comment="gcc7-fortran-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268656" version="1" comment="gcc7-fortran-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603336" version="1" comment="gcc7-go is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268657" version="1" comment="gcc7-go is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603337" version="1" comment="gcc7-go-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268658" version="1" comment="gcc7-go-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603338" version="1" comment="gcc7-info is &lt;7.4.1+r275405-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268659" version="1" comment="gcc7-info is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603339" version="1" comment="gcc7-locale is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268660" version="1" comment="gcc7-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603340" version="1" comment="gcc7-obj-c++ is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268661" version="1" comment="gcc7-obj-c++ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603341" version="1" comment="gcc7-obj-c++-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268662" version="1" comment="gcc7-obj-c++-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603342" version="1" comment="gcc7-objc is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268663" version="1" comment="gcc7-objc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603343" version="1" comment="gcc7-objc-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268664" version="1" comment="gcc7-objc-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608129" version="1" comment="gcc9 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283953" version="1" comment="gcc9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608130" version="1" comment="gcc9-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283954" version="1" comment="gcc9-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608131" version="1" comment="gcc9-ada is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283955" version="1" comment="gcc9-ada is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608132" version="1" comment="gcc9-ada-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283956" version="1" comment="gcc9-ada-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608133" version="1" comment="gcc9-c++ is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283957" version="1" comment="gcc9-c++ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608134" version="1" comment="gcc9-c++-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283958" version="1" comment="gcc9-c++-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608135" version="1" comment="gcc9-fortran is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283959" version="1" comment="gcc9-fortran is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608136" version="1" comment="gcc9-fortran-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283960" version="1" comment="gcc9-fortran-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608137" version="1" comment="gcc9-go is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283961" version="1" comment="gcc9-go is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608138" version="1" comment="gcc9-go-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283962" version="1" comment="gcc9-go-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608139" version="1" comment="gcc9-info is &lt;9.3.1+git1296-lp151.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283963" version="1" comment="gcc9-info is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608140" version="1" comment="gcc9-locale is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283964" version="1" comment="gcc9-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603344" version="1" comment="libada7 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268665" version="1" comment="libada7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603345" version="1" comment="libada7-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268666" version="1" comment="libada7-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608141" version="1" comment="libada9 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283965" version="1" comment="libada9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608142" version="1" comment="libada9-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283966" version="1" comment="libada9-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603346" version="1" comment="libasan4 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268667" version="1" comment="libasan4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603347" version="1" comment="libasan4-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268668" version="1" comment="libasan4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608143" version="1" comment="libasan5 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283967" version="1" comment="libasan5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608144" version="1" comment="libasan5-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283968" version="1" comment="libasan5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608145" version="1" comment="libatomic1 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152915" version="1" comment="libatomic1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608146" version="1" comment="libatomic1-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152916" version="1" comment="libatomic1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603348" version="1" comment="libcilkrts5 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152919" version="1" comment="libcilkrts5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603349" version="1" comment="libcilkrts5-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152920" version="1" comment="libcilkrts5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608147" version="1" comment="libgcc_s1 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152931" version="1" comment="libgcc_s1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608148" version="1" comment="libgcc_s1-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152932" version="1" comment="libgcc_s1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603350" version="1" comment="libgfortran4 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268669" version="1" comment="libgfortran4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603351" version="1" comment="libgfortran4-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268670" version="1" comment="libgfortran4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608149" version="1" comment="libgfortran5 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283969" version="1" comment="libgfortran5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608150" version="1" comment="libgfortran5-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283970" version="1" comment="libgfortran5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603352" version="1" comment="libgo11 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268671" version="1" comment="libgo11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603353" version="1" comment="libgo11-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268672" version="1" comment="libgo11-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608151" version="1" comment="libgo14 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283971" version="1" comment="libgo14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608152" version="1" comment="libgo14-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283972" version="1" comment="libgo14-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608153" version="1" comment="libgomp1 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152942" version="1" comment="libgomp1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608154" version="1" comment="libgomp1-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152943" version="1" comment="libgomp1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608155" version="1" comment="libitm1 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152946" version="1" comment="libitm1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608156" version="1" comment="libitm1-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152947" version="1" comment="libitm1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608157" version="1" comment="liblsan0 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152950" version="1" comment="liblsan0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603354" version="1" comment="libobjc4 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152198" version="1" comment="libobjc4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603355" version="1" comment="libobjc4-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152955" version="1" comment="libobjc4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608158" version="1" comment="libquadmath0 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152956" version="1" comment="libquadmath0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608159" version="1" comment="libquadmath0-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152957" version="1" comment="libquadmath0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608160" version="1" comment="libstdc++6 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152962" version="1" comment="libstdc++6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608161" version="1" comment="libstdc++6-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152963" version="1" comment="libstdc++6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603356" version="1" comment="libstdc++6-devel-gcc7 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268673" version="1" comment="libstdc++6-devel-gcc7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603357" version="1" comment="libstdc++6-devel-gcc7-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268674" version="1" comment="libstdc++6-devel-gcc7-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608162" version="1" comment="libstdc++6-devel-gcc9 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283973" version="1" comment="libstdc++6-devel-gcc9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608163" version="1" comment="libstdc++6-devel-gcc9-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283974" version="1" comment="libstdc++6-devel-gcc9-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608164" version="1" comment="libstdc++6-locale is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152968" version="1" comment="libstdc++6-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608165" version="1" comment="libstdc++6-pp-gcc9 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283975" version="1" comment="libstdc++6-pp-gcc9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608166" version="1" comment="libstdc++6-pp-gcc9-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283976" version="1" comment="libstdc++6-pp-gcc9-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608167" version="1" comment="libtsan0 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152969" version="1" comment="libtsan0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603358" version="1" comment="libubsan0 is &lt;7.4.1+r275405-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152971" version="1" comment="libubsan0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603359" version="1" comment="libubsan0-32bit is &lt;7.4.1+r275405-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152972" version="1" comment="libubsan0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608168" version="1" comment="libubsan1 is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283977" version="1" comment="libubsan1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608169" version="1" comment="libubsan1-32bit is &lt;9.3.1+git1296-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283978" version="1" comment="libubsan1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607270" version="1" comment="libmcpp0 is &lt;2.7.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280715" version="1" comment="libmcpp0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607271" version="1" comment="mcpp is &lt;2.7.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280716" version="1" comment="mcpp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607272" version="1" comment="mcpp-devel is &lt;2.7.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280717" version="1" comment="mcpp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606002" version="1" comment="transfig is &lt;3.2.6a-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603300" version="1" comment="sudo is &lt;1.8.22-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151407" version="1" comment="sudo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603301" version="1" comment="sudo-devel is &lt;1.8.22-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152559" version="1" comment="sudo-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603302" version="1" comment="sudo-test is &lt;1.8.22-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152560" version="1" comment="sudo-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609762" version="1" comment="libcryptopp-devel is &lt;5.6.5-lp151.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262572" version="1" comment="libcryptopp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609763" version="1" comment="libcryptopp5_6_5 is &lt;5.6.5-lp151.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262574" version="1" comment="libcryptopp5_6_5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509954" version="1" comment="libcryptopp5_6_5-32bit is &lt;5.6.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262576" version="1" comment="libcryptopp5_6_5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603884" version="1" comment="libopencv3_3 is &lt;3.3.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223580" version="1" comment="libopencv3_3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603885" version="1" comment="opencv is &lt;3.3.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175725" version="1" comment="opencv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603886" version="1" comment="opencv-devel is &lt;3.3.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175727" version="1" comment="opencv-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603887" version="1" comment="opencv-doc is &lt;3.3.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175729" version="1" comment="opencv-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603888" version="1" comment="python2-opencv is &lt;3.3.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223581" version="1" comment="python2-opencv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603889" version="1" comment="python3-opencv is &lt;3.3.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175741" version="1" comment="python3-opencv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602522" version="1" comment="schismtracker is &lt;20190805-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009262655" version="1" comment="schismtracker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607017" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231457" version="1" comment="ovmf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607018" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-lp151.11.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231458" version="1" comment="ovmf-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607019" version="1" comment="qemu-ovmf-ia32 is &lt;2017+git1510945757.b2662641d5-lp151.11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231459" version="1" comment="qemu-ovmf-ia32 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607020" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-lp151.11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231460" version="1" comment="qemu-ovmf-x86_64 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607021" version="1" comment="qemu-ovmf-x86_64-debug is &lt;2017+git1510945757.b2662641d5-lp151.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231461" version="1" comment="qemu-ovmf-x86_64-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607853" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607854" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607855" version="1" comment="qemu-ovmf-ia32 is &lt;2017+git1510945757.b2662641d5-lp151.11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607856" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-lp151.11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607857" version="1" comment="qemu-ovmf-x86_64-debug is &lt;2017+git1510945757.b2662641d5-lp151.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605416" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605417" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-lp151.11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605418" version="1" comment="qemu-ovmf-ia32 is &lt;2017+git1510945757.b2662641d5-lp151.11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605419" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-lp151.11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605420" version="1" comment="qemu-ovmf-x86_64-debug is &lt;2017+git1510945757.b2662641d5-lp151.11.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606900" version="1" comment="ovmf is &lt;2017+git1510945757.b2662641d5-lp151.11.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606901" version="1" comment="ovmf-tools is &lt;2017+git1510945757.b2662641d5-lp151.11.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606902" version="1" comment="qemu-ovmf-ia32 is &lt;2017+git1510945757.b2662641d5-lp151.11.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606903" version="1" comment="qemu-ovmf-x86_64 is &lt;2017+git1510945757.b2662641d5-lp151.11.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606904" version="1" comment="qemu-ovmf-x86_64-debug is &lt;2017+git1510945757.b2662641d5-lp151.11.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607042" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607043" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607044" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607045" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607046" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607047" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607048" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607049" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607050" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607051" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607052" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607053" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607054" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607055" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607056" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607057" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607058" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.40.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607059" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607060" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607061" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607062" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609764" version="1" comment="kconf_update5 is &lt;5.55.0-lp151.2.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261533" version="1" comment="kconf_update5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609765" version="1" comment="kconfig-devel is &lt;5.55.0-lp151.2.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261537" version="1" comment="kconfig-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509776" version="1" comment="kconfig-devel-32bit is &lt;5.55.0-lp151.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261539" version="1" comment="kconfig-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609766" version="1" comment="kdelibs4 is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152123" version="1" comment="kdelibs4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609767" version="1" comment="kdelibs4-apidocs is &lt;4.14.38-lp151.9.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154035" version="1" comment="kdelibs4-apidocs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609768" version="1" comment="kdelibs4-branding-upstream is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154036" version="1" comment="kdelibs4-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609769" version="1" comment="kdelibs4-core is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152124" version="1" comment="kdelibs4-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609770" version="1" comment="kdelibs4-doc is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152125" version="1" comment="kdelibs4-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609771" version="1" comment="libKF5ConfigCore5 is &lt;5.55.0-lp151.2.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261546" version="1" comment="libKF5ConfigCore5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509784" version="1" comment="libKF5ConfigCore5-32bit is &lt;5.55.0-lp151.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261548" version="1" comment="libKF5ConfigCore5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609772" version="1" comment="libKF5ConfigCore5-lang is &lt;5.55.0-lp151.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261550" version="1" comment="libKF5ConfigCore5-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609773" version="1" comment="libKF5ConfigGui5 is &lt;5.55.0-lp151.2.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261552" version="1" comment="libKF5ConfigGui5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509788" version="1" comment="libKF5ConfigGui5-32bit is &lt;5.55.0-lp151.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261554" version="1" comment="libKF5ConfigGui5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609774" version="1" comment="libkde4 is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152126" version="1" comment="libkde4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509791" version="1" comment="libkde4-32bit is &lt;4.14.38-lp151.9.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154044" version="1" comment="libkde4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609775" version="1" comment="libkde4-devel is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152127" version="1" comment="libkde4-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609776" version="1" comment="libkdecore4 is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152128" version="1" comment="libkdecore4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509795" version="1" comment="libkdecore4-32bit is &lt;4.14.38-lp151.9.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154045" version="1" comment="libkdecore4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609777" version="1" comment="libkdecore4-devel is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152129" version="1" comment="libkdecore4-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609778" version="1" comment="libksuseinstall-devel is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154046" version="1" comment="libksuseinstall-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609779" version="1" comment="libksuseinstall1 is &lt;4.14.38-lp151.9.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152130" version="1" comment="libksuseinstall1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509800" version="1" comment="libksuseinstall1-32bit is &lt;4.14.38-lp151.9.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154047" version="1" comment="libksuseinstall1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607330" version="1" comment="python2-nltk is &lt;3.4.5-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280958" version="1" comment="python2-nltk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607331" version="1" comment="python3-nltk is &lt;3.4.5-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280959" version="1" comment="python3-nltk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602812" version="1" comment="python-Werkzeug-doc is &lt;0.14.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263953" version="1" comment="python-Werkzeug-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602813" version="1" comment="python2-Werkzeug is &lt;0.14.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263954" version="1" comment="python2-Werkzeug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602814" version="1" comment="python3-Werkzeug is &lt;0.14.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263955" version="1" comment="python3-Werkzeug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602650" version="1" comment="go1.11 is &lt;1.11.13-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602651" version="1" comment="go1.11-doc is &lt;1.11.13-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602652" version="1" comment="go1.11-race is &lt;1.11.13-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602709" version="1" comment="go1.12 is &lt;1.12.9-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602710" version="1" comment="go1.12-doc is &lt;1.12.9-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602711" version="1" comment="go1.12-race is &lt;1.12.9-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603022" version="1" comment="ibus is &lt;1.5.19-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265415" version="1" comment="ibus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603023" version="1" comment="ibus-devel is &lt;1.5.19-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265417" version="1" comment="ibus-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603024" version="1" comment="ibus-gtk is &lt;1.5.19-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265418" version="1" comment="ibus-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603025" version="1" comment="ibus-gtk-32bit is &lt;1.5.19-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265419" version="1" comment="ibus-gtk-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603026" version="1" comment="ibus-gtk3 is &lt;1.5.19-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265420" version="1" comment="ibus-gtk3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603027" version="1" comment="ibus-gtk3-32bit is &lt;1.5.19-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265421" version="1" comment="ibus-gtk3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603028" version="1" comment="ibus-lang is &lt;1.5.19-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265422" version="1" comment="ibus-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603029" version="1" comment="libibus-1_0-5 is &lt;1.5.19-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265423" version="1" comment="libibus-1_0-5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603030" version="1" comment="libibus-1_0-5-32bit is &lt;1.5.19-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265424" version="1" comment="libibus-1_0-5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603031" version="1" comment="python-ibus is &lt;1.5.19-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265425" version="1" comment="python-ibus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603032" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.19-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265427" version="1" comment="typelib-1_0-IBus-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603616" version="1" comment="python2-ecdsa is &lt;0.13.3-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270409" version="1" comment="python2-ecdsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603617" version="1" comment="python3-ecdsa is &lt;0.13.3-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270410" version="1" comment="python3-ecdsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603625" version="1" comment="apache2-mod_auth_openidc is &lt;2.3.8-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270746" version="1" comment="apache2-mod_auth_openidc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603941" version="1" comment="ctdb is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603942" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603943" version="1" comment="ctdb-tests is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603944" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603945" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603946" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603947" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603948" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603949" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603950" version="1" comment="libdcerpc0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603951" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603952" version="1" comment="libndr-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603953" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603954" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603955" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603956" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603957" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603958" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603959" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603960" version="1" comment="libndr-standard0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603961" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603962" version="1" comment="libndr0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603963" version="1" comment="libndr0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603964" version="1" comment="libnetapi-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603965" version="1" comment="libnetapi0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603966" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603967" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603968" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603969" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603970" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603971" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603972" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603973" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603974" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603975" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603976" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603977" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603978" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603979" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603980" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603981" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603982" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603983" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603984" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603985" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603986" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603987" version="1" comment="libsamba-util0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603988" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603989" version="1" comment="libsamdb-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603990" version="1" comment="libsamdb0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603991" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603992" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603993" version="1" comment="libsmbclient0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603994" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603995" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603996" version="1" comment="libsmbconf0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603997" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603998" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603999" version="1" comment="libsmbldap2 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604000" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604001" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604002" version="1" comment="libtevent-util0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604003" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604004" version="1" comment="libwbclient-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604005" version="1" comment="libwbclient0 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604006" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604007" version="1" comment="samba is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604008" version="1" comment="samba-ad-dc is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604009" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604010" version="1" comment="samba-ceph is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604011" version="1" comment="samba-client is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604012" version="1" comment="samba-client-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604013" version="1" comment="samba-core-devel is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604014" version="1" comment="samba-doc is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604015" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604016" version="1" comment="samba-libs is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604017" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604018" version="1" comment="samba-libs-python is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604019" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604020" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604021" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604022" version="1" comment="samba-pidl is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604023" version="1" comment="samba-python is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604024" version="1" comment="samba-python3 is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604025" version="1" comment="samba-test is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604026" version="1" comment="samba-winbind is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604027" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.224.86a8e66adea-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603814" version="1" comment="cpio is &lt;2.12-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151389" version="1" comment="cpio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603815" version="1" comment="cpio-lang is &lt;2.12-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151390" version="1" comment="cpio-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603816" version="1" comment="cpio-mt is &lt;2.12-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177165" version="1" comment="cpio-mt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603737" version="1" comment="ghostscript is &lt;9.27-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603738" version="1" comment="ghostscript-devel is &lt;9.27-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603739" version="1" comment="ghostscript-mini is &lt;9.27-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603740" version="1" comment="ghostscript-mini-devel is &lt;9.27-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603741" version="1" comment="ghostscript-x11 is &lt;9.27-lp151.3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604361" version="1" comment="libssh-devel is &lt;0.8.7-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151771" version="1" comment="libssh-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604362" version="1" comment="libssh4 is &lt;0.8.7-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151772" version="1" comment="libssh4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604363" version="1" comment="libssh4-32bit is &lt;0.8.7-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153278" version="1" comment="libssh4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603892" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603893" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603894" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603895" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603896" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603897" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603898" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603899" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603900" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603901" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603902" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603903" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603904" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603905" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603906" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603907" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603908" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603909" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603910" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603911" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603912" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604630" version="1" comment="ctdb is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604631" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604632" version="1" comment="ctdb-tests is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604633" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604634" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604635" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604636" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604637" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604638" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604639" version="1" comment="libdcerpc0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604640" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604641" version="1" comment="libndr-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604642" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604643" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604644" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604645" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604646" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604647" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604648" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604649" version="1" comment="libndr-standard0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604650" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604651" version="1" comment="libndr0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604652" version="1" comment="libndr0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604653" version="1" comment="libnetapi-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604654" version="1" comment="libnetapi0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604655" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604656" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604657" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604658" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604659" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604660" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604661" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604662" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604663" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604664" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604665" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604666" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604667" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604668" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604669" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604670" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604671" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604672" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604673" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604674" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604675" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604676" version="1" comment="libsamba-util0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604677" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604678" version="1" comment="libsamdb-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604679" version="1" comment="libsamdb0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604680" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604681" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604682" version="1" comment="libsmbclient0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604683" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604684" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604685" version="1" comment="libsmbconf0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604686" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604687" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604688" version="1" comment="libsmbldap2 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604689" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604690" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604691" version="1" comment="libtevent-util0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604692" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604693" version="1" comment="libwbclient-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604694" version="1" comment="libwbclient0 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604695" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604696" version="1" comment="samba is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604697" version="1" comment="samba-ad-dc is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604698" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604699" version="1" comment="samba-ceph is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604700" version="1" comment="samba-client is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604701" version="1" comment="samba-client-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604702" version="1" comment="samba-core-devel is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604703" version="1" comment="samba-doc is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604704" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604705" version="1" comment="samba-libs is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604706" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604707" version="1" comment="samba-libs-python is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604708" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604709" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604710" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604711" version="1" comment="samba-pidl is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604712" version="1" comment="samba-python is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604713" version="1" comment="samba-python3 is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604714" version="1" comment="samba-test is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604715" version="1" comment="samba-winbind is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604716" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.243.e76c5cb3d97-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605978" version="1" comment="libtiff-devel is &lt;4.0.9-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151316" version="1" comment="libtiff-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605979" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-lp151.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152222" version="1" comment="libtiff-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605980" version="1" comment="libtiff5 is &lt;4.0.9-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151317" version="1" comment="libtiff5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605981" version="1" comment="libtiff5-32bit is &lt;4.0.9-lp151.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151318" version="1" comment="libtiff5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605982" version="1" comment="tiff is &lt;4.0.9-lp151.10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151319" version="1" comment="tiff is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603705" version="1" comment="ImageMagick is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603706" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603707" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603708" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603709" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603710" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp151.7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603711" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603712" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603713" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603714" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603715" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603716" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603717" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603718" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603719" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603720" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607382" version="1" comment="qemu is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607383" version="1" comment="qemu-arm is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607384" version="1" comment="qemu-audio-alsa is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607385" version="1" comment="qemu-audio-oss is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607386" version="1" comment="qemu-audio-pa is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607387" version="1" comment="qemu-audio-sdl is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607388" version="1" comment="qemu-block-curl is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607389" version="1" comment="qemu-block-dmg is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607390" version="1" comment="qemu-block-gluster is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607391" version="1" comment="qemu-block-iscsi is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607392" version="1" comment="qemu-block-nfs is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607393" version="1" comment="qemu-block-rbd is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607394" version="1" comment="qemu-block-ssh is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607395" version="1" comment="qemu-extra is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607396" version="1" comment="qemu-guest-agent is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607397" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp151.7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607398" version="1" comment="qemu-ksm is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607399" version="1" comment="qemu-kvm is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607400" version="1" comment="qemu-lang is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607401" version="1" comment="qemu-linux-user is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607402" version="1" comment="qemu-ppc is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607403" version="1" comment="qemu-s390 is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607404" version="1" comment="qemu-seabios is &lt;1.12.0-lp151.7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607405" version="1" comment="qemu-sgabios is &lt;8-lp151.7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607406" version="1" comment="qemu-tools is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607407" version="1" comment="qemu-ui-curses is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607408" version="1" comment="qemu-ui-gtk is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607409" version="1" comment="qemu-ui-sdl is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607410" version="1" comment="qemu-vgabios is &lt;1.12.0-lp151.7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607411" version="1" comment="qemu-x86 is &lt;3.1.1.1-lp151.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603082" version="1" comment="djvulibre is &lt;3.5.27-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266976" version="1" comment="djvulibre is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603083" version="1" comment="djvulibre-doc is &lt;3.5.27-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266977" version="1" comment="djvulibre-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603084" version="1" comment="libdjvulibre-devel is &lt;3.5.27-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266978" version="1" comment="libdjvulibre-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603085" version="1" comment="libdjvulibre21 is &lt;3.5.27-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266979" version="1" comment="libdjvulibre21 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603166" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-lp151.5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231070" version="1" comment="libopenssl-1_0_0-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603167" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-lp151.5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231071" version="1" comment="libopenssl-1_0_0-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602840" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231072" version="1" comment="libopenssl-1_1-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602841" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.0i-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231073" version="1" comment="libopenssl-1_1-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603168" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-lp151.5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151065" version="1" comment="libopenssl1_0_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603169" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-lp151.5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151066" version="1" comment="libopenssl1_0_0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603170" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-lp151.5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152704" version="1" comment="libopenssl1_0_0-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603171" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-lp151.5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152705" version="1" comment="libopenssl1_0_0-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603172" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-lp151.5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171502" version="1" comment="libopenssl1_0_0-steam is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603173" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-lp151.5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009171503" version="1" comment="libopenssl1_0_0-steam-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602842" version="1" comment="libopenssl1_1 is &lt;1.1.0i-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177120" version="1" comment="libopenssl1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602843" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177121" version="1" comment="libopenssl1_1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602844" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231074" version="1" comment="libopenssl1_1-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602845" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231075" version="1" comment="libopenssl1_1-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603174" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-lp151.5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231076" version="1" comment="openssl-1_0_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603175" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-lp151.5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231077" version="1" comment="openssl-1_0_0-cavs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603176" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-lp151.5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231078" version="1" comment="openssl-1_0_0-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602846" version="1" comment="openssl-1_1 is &lt;1.1.0i-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177122" version="1" comment="openssl-1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602847" version="1" comment="openssl-1_1-doc is &lt;1.1.0i-lp151.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231079" version="1" comment="openssl-1_1-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607826" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607827" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-lp151.5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607837" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607838" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.0i-lp151.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607828" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607829" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-lp151.5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607830" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607831" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-lp151.5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607832" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607833" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-lp151.5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607839" version="1" comment="libopenssl1_1 is &lt;1.1.0i-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607840" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-lp151.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607841" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607842" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-lp151.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607834" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607835" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607836" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-lp151.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607843" version="1" comment="openssl-1_1 is &lt;1.1.0i-lp151.8.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607844" version="1" comment="openssl-1_1-doc is &lt;1.1.0i-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602537" version="1" comment="libmirage-3_2 is &lt;3.2.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263214" version="1" comment="libmirage-3_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602538" version="1" comment="libmirage-data is &lt;3.2.2-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263215" version="1" comment="libmirage-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602539" version="1" comment="libmirage-devel is &lt;3.2.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263216" version="1" comment="libmirage-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602540" version="1" comment="libmirage-lang is &lt;3.2.2-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263217" version="1" comment="libmirage-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602541" version="1" comment="libmirage11 is &lt;3.2.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263218" version="1" comment="libmirage11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602542" version="1" comment="typelib-1_0-libmirage-3_2 is &lt;3.2.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263219" version="1" comment="typelib-1_0-libmirage-3_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601274" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601275" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601276" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601277" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601278" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601279" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601280" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601281" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601282" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607004" version="1" comment="nodejs8 is &lt;8.17.0-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607005" version="1" comment="nodejs8-devel is &lt;8.17.0-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607006" version="1" comment="nodejs8-docs is &lt;8.17.0-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607007" version="1" comment="npm8 is &lt;8.17.0-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609780" version="1" comment="nextcloud is &lt;15.0.14-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164979" version="1" comment="nextcloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607859" version="1" comment="LibVNCServer-devel is &lt;0.9.10-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607860" version="1" comment="libvncclient0 is &lt;0.9.10-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607861" version="1" comment="libvncserver0 is &lt;0.9.10-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604401" version="1" comment="vino is &lt;3.22.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151564" version="1" comment="vino is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604402" version="1" comment="vino-lang is &lt;3.22.0-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151565" version="1" comment="vino-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609052" version="1" comment="libXvnc-devel is &lt;1.9.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154213" version="1" comment="libXvnc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609053" version="1" comment="libXvnc1 is &lt;1.9.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154118" version="1" comment="libXvnc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609054" version="1" comment="tigervnc is &lt;1.9.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152053" version="1" comment="tigervnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609055" version="1" comment="tigervnc-x11vnc is &lt;1.9.0-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276534" version="1" comment="tigervnc-x11vnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609056" version="1" comment="xorg-x11-Xvnc is &lt;1.9.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152054" version="1" comment="xorg-x11-Xvnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609057" version="1" comment="xorg-x11-Xvnc-java is &lt;1.9.0-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276535" version="1" comment="xorg-x11-Xvnc-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609058" version="1" comment="xorg-x11-Xvnc-module is &lt;1.9.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276536" version="1" comment="xorg-x11-Xvnc-module is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609059" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.9.0-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276537" version="1" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602664" version="1" comment="libmirage-3_2 is &lt;3.2.2-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602665" version="1" comment="libmirage-data is &lt;3.2.2-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602666" version="1" comment="libmirage-devel is &lt;3.2.2-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602667" version="1" comment="libmirage-lang is &lt;3.2.2-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602668" version="1" comment="libmirage11 is &lt;3.2.2-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602669" version="1" comment="typelib-1_0-libmirage-3_2 is &lt;3.2.2-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602655" version="1" comment="libsrt1 is &lt;1.3.4-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266873" version="1" comment="libsrt1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602656" version="1" comment="srt is &lt;1.3.4-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266874" version="1" comment="srt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602657" version="1" comment="srt-devel is &lt;1.3.4-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266875" version="1" comment="srt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602661" version="1" comment="exim is &lt;4.88-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602662" version="1" comment="eximon is &lt;4.88-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602663" version="1" comment="eximstats-html is &lt;4.88-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603015" version="1" comment="libvarnishapi2 is &lt;6.2.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265429" version="1" comment="libvarnishapi2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603016" version="1" comment="varnish is &lt;6.2.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265431" version="1" comment="varnish is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603017" version="1" comment="varnish-devel is &lt;6.2.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265433" version="1" comment="varnish-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603050" version="1" comment="expat is &lt;2.2.5-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603051" version="1" comment="libexpat-devel is &lt;2.2.5-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603052" version="1" comment="libexpat-devel-32bit is &lt;2.2.5-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603053" version="1" comment="libexpat1 is &lt;2.2.5-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603054" version="1" comment="libexpat1-32bit is &lt;2.2.5-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603875" version="1" comment="libclamav7 is &lt;0.100.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603876" version="1" comment="libclammspack0 is &lt;0.100.3-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603367" version="1" comment="libpython2_7-1_0 is &lt;2.7.14-lp151.10.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603368" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.14-lp151.10.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609781" version="1" comment="libpython3_6m1_0 is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609782" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.10-lp151.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603369" version="1" comment="python is &lt;2.7.14-lp151.10.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603370" version="1" comment="python-32bit is &lt;2.7.14-lp151.10.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603371" version="1" comment="python-base is &lt;2.7.14-lp151.10.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603372" version="1" comment="python-base-32bit is &lt;2.7.14-lp151.10.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603373" version="1" comment="python-curses is &lt;2.7.14-lp151.10.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603374" version="1" comment="python-demo is &lt;2.7.14-lp151.10.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603375" version="1" comment="python-devel is &lt;2.7.14-lp151.10.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603376" version="1" comment="python-doc is &lt;2.7.14-lp151.10.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603377" version="1" comment="python-doc-pdf is &lt;2.7.14-lp151.10.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603378" version="1" comment="python-gdbm is &lt;2.7.14-lp151.10.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603379" version="1" comment="python-idle is &lt;2.7.14-lp151.10.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603380" version="1" comment="python-tk is &lt;2.7.14-lp151.10.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603381" version="1" comment="python-xml is &lt;2.7.14-lp151.10.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609783" version="1" comment="python3 is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609784" version="1" comment="python3-32bit is &lt;3.6.10-lp151.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609785" version="1" comment="python3-base is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609786" version="1" comment="python3-base-32bit is &lt;3.6.10-lp151.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609787" version="1" comment="python3-curses is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609788" version="1" comment="python3-dbm is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609789" version="1" comment="python3-devel is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609790" version="1" comment="python3-idle is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609791" version="1" comment="python3-testsuite is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609792" version="1" comment="python3-tk is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609793" version="1" comment="python3-tools is &lt;3.6.10-lp151.6.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602848" version="1" comment="bird is &lt;1.6.8-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266876" version="1" comment="bird is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602849" version="1" comment="bird-common is &lt;1.6.8-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266877" version="1" comment="bird-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602850" version="1" comment="bird-doc is &lt;1.6.8-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266878" version="1" comment="bird-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602851" version="1" comment="bird6 is &lt;1.6.8-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266879" version="1" comment="bird6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603382" version="1" comment="sysstat is &lt;12.0.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247516" version="1" comment="sysstat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603383" version="1" comment="sysstat-isag is &lt;12.0.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247517" version="1" comment="sysstat-isag is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603263" version="1" comment="libsqlite3-0 is &lt;3.28.0-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153745" version="1" comment="libsqlite3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603264" version="1" comment="libsqlite3-0-32bit is &lt;3.28.0-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153746" version="1" comment="libsqlite3-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603265" version="1" comment="sqlite3 is &lt;3.28.0-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153747" version="1" comment="sqlite3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603266" version="1" comment="sqlite3-devel is &lt;3.28.0-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153748" version="1" comment="sqlite3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603267" version="1" comment="sqlite3-doc is &lt;3.28.0-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153749" version="1" comment="sqlite3-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603584" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603585" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603586" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603587" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603588" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603589" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603590" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603591" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603592" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603593" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603594" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603595" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603596" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603597" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603598" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603599" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603600" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603601" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603602" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603603" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603604" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603363" version="1" comment="openconnect is &lt;7.08-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151736" version="1" comment="openconnect is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603364" version="1" comment="openconnect-devel is &lt;7.08-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151737" version="1" comment="openconnect-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603365" version="1" comment="openconnect-doc is &lt;7.08-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268921" version="1" comment="openconnect-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603366" version="1" comment="openconnect-lang is &lt;7.08-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177178" version="1" comment="openconnect-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603721" version="1" comment="go1.12 is &lt;1.12.12-lp151.2.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603722" version="1" comment="go1.12-doc is &lt;1.12.12-lp151.2.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603723" version="1" comment="go1.12-race is &lt;1.12.12-lp151.2.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608048" version="1" comment="python2-rpyc is &lt;4.1.5-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283674" version="1" comment="python2-rpyc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608049" version="1" comment="python3-rpyc is &lt;4.1.5-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283675" version="1" comment="python3-rpyc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608834" version="1" comment="file-roller is &lt;3.26.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153800" version="1" comment="file-roller is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608835" version="1" comment="file-roller-lang is &lt;3.26.2-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153801" version="1" comment="file-roller-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605687" version="1" comment="hunspell is &lt;1.6.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153301" version="1" comment="hunspell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605688" version="1" comment="hunspell-devel is &lt;1.6.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153303" version="1" comment="hunspell-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605689" version="1" comment="hunspell-devel-32bit is &lt;1.6.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153304" version="1" comment="hunspell-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605690" version="1" comment="hunspell-tools is &lt;1.6.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153306" version="1" comment="hunspell-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605691" version="1" comment="libhunspell-1_6-0 is &lt;1.6.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296727" version="1" comment="libhunspell-1_6-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605692" version="1" comment="libhunspell-1_6-0-32bit is &lt;1.6.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296728" version="1" comment="libhunspell-1_6-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603303" version="1" comment="GraphicsMagick is &lt;1.3.29-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603304" version="1" comment="GraphicsMagick-devel is &lt;1.3.29-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603305" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.29-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603306" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.29-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603307" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.29-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603308" version="1" comment="libGraphicsMagick3-config is &lt;1.3.29-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603309" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.29-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603310" version="1" comment="perl-GraphicsMagick is &lt;1.3.29-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604491" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604492" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604493" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604494" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604495" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604496" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604497" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604498" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604499" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604500" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604501" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604502" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604503" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604504" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604505" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604506" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604507" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604508" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604509" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604510" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604511" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606227" version="1" comment="rmt-server is &lt;2.6.5-lp151.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606228" version="1" comment="rmt-server-config is &lt;2.6.5-lp151.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606229" version="1" comment="rmt-server-pubcloud is &lt;2.6.5-lp151.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607680" version="1" comment="nodejs8 is &lt;8.17.0-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607681" version="1" comment="nodejs8-devel is &lt;8.17.0-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607682" version="1" comment="nodejs8-docs is &lt;8.17.0-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607683" version="1" comment="npm8 is &lt;8.17.0-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607160" version="1" comment="ruby2.5-rubygem-excon is &lt;0.59.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275706" version="1" comment="ruby2.5-rubygem-excon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607161" version="1" comment="ruby2.5-rubygem-excon-doc is &lt;0.59.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275707" version="1" comment="ruby2.5-rubygem-excon-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607162" version="1" comment="ruby2.5-rubygem-excon-testsuite is &lt;0.59.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275708" version="1" comment="ruby2.5-rubygem-excon-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606154" version="1" comment="python2-waitress is &lt;1.4.3-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299158" version="1" comment="python2-waitress is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606155" version="1" comment="python3-waitress is &lt;1.4.3-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299159" version="1" comment="python3-waitress is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607341" version="1" comment="containerd is &lt;1.2.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607342" version="1" comment="containerd-ctr is &lt;1.2.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607343" version="1" comment="docker is &lt;19.03.5_ce-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607344" version="1" comment="docker-bash-completion is &lt;19.03.5_ce-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607345" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607346" version="1" comment="docker-runc is &lt;1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607347" version="1" comment="docker-test is &lt;19.03.5_ce-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607348" version="1" comment="docker-zsh-completion is &lt;19.03.5_ce-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607349" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606883" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606884" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.12-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606885" version="1" comment="python3 is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606886" version="1" comment="python3-32bit is &lt;3.6.12-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606887" version="1" comment="python3-base is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606888" version="1" comment="python3-base-32bit is &lt;3.6.12-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606889" version="1" comment="python3-curses is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606890" version="1" comment="python3-dbm is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606891" version="1" comment="python3-devel is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606892" version="1" comment="python3-doc is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152174" version="1" comment="python3-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606893" version="1" comment="python3-doc-devhelp is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340456" version="1" comment="python3-doc-devhelp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606894" version="1" comment="python3-idle is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606895" version="1" comment="python3-testsuite is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606896" version="1" comment="python3-tk is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606897" version="1" comment="python3-tools is &lt;3.6.12-lp151.6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609017" version="1" comment="libfreebl3 is &lt;3.53-lp151.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609018" version="1" comment="libfreebl3-32bit is &lt;3.53-lp151.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609019" version="1" comment="libfreebl3-hmac is &lt;3.53-lp151.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609020" version="1" comment="libfreebl3-hmac-32bit is &lt;3.53-lp151.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609021" version="1" comment="libsoftokn3 is &lt;3.53-lp151.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609022" version="1" comment="libsoftokn3-32bit is &lt;3.53-lp151.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609023" version="1" comment="libsoftokn3-hmac is &lt;3.53-lp151.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609024" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.53-lp151.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609025" version="1" comment="mozilla-nspr is &lt;4.25-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609026" version="1" comment="mozilla-nspr-32bit is &lt;4.25-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609027" version="1" comment="mozilla-nspr-devel is &lt;4.25-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609028" version="1" comment="mozilla-nss is &lt;3.53-lp151.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609029" version="1" comment="mozilla-nss-32bit is &lt;3.53-lp151.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609030" version="1" comment="mozilla-nss-certs is &lt;3.53-lp151.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609031" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53-lp151.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609032" version="1" comment="mozilla-nss-devel is &lt;3.53-lp151.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609033" version="1" comment="mozilla-nss-sysinit is &lt;3.53-lp151.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609034" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.53-lp151.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609035" version="1" comment="mozilla-nss-tools is &lt;3.53-lp151.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607718" version="1" comment="MozillaFirefox is &lt;68.4.1-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607719" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.4.1-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607720" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.4.1-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607721" version="1" comment="MozillaFirefox-devel is &lt;68.4.1-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607722" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607723" version="1" comment="MozillaFirefox-translations-other is &lt;68.4.1-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609186" version="1" comment="MozillaThunderbird is &lt;68.4.1-lp151.2.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609187" version="1" comment="MozillaThunderbird-translations-common is &lt;68.4.1-lp151.2.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609188" version="1" comment="MozillaThunderbird-translations-other is &lt;68.4.1-lp151.2.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603626" version="1" comment="rsyslog is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151645" version="1" comment="rsyslog is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603627" version="1" comment="rsyslog-diag-tools is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230484" version="1" comment="rsyslog-diag-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603628" version="1" comment="rsyslog-doc is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230485" version="1" comment="rsyslog-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603629" version="1" comment="rsyslog-module-dbi is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230486" version="1" comment="rsyslog-module-dbi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603630" version="1" comment="rsyslog-module-elasticsearch is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230487" version="1" comment="rsyslog-module-elasticsearch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603631" version="1" comment="rsyslog-module-gcrypt is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230488" version="1" comment="rsyslog-module-gcrypt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603632" version="1" comment="rsyslog-module-gssapi is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230489" version="1" comment="rsyslog-module-gssapi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603633" version="1" comment="rsyslog-module-gtls is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230490" version="1" comment="rsyslog-module-gtls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603634" version="1" comment="rsyslog-module-mmnormalize is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230491" version="1" comment="rsyslog-module-mmnormalize is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603635" version="1" comment="rsyslog-module-mysql is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230492" version="1" comment="rsyslog-module-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603636" version="1" comment="rsyslog-module-omamqp1 is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230493" version="1" comment="rsyslog-module-omamqp1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603637" version="1" comment="rsyslog-module-omhttpfs is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230494" version="1" comment="rsyslog-module-omhttpfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603638" version="1" comment="rsyslog-module-omtcl is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230495" version="1" comment="rsyslog-module-omtcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603639" version="1" comment="rsyslog-module-pgsql is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230496" version="1" comment="rsyslog-module-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603640" version="1" comment="rsyslog-module-relp is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230497" version="1" comment="rsyslog-module-relp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603641" version="1" comment="rsyslog-module-snmp is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230498" version="1" comment="rsyslog-module-snmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603642" version="1" comment="rsyslog-module-udpspoof is &lt;8.33.1-lp151.6.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009230499" version="1" comment="rsyslog-module-udpspoof is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603233" version="1" comment="putty is &lt;0.73-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152979" version="1" comment="putty is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603268" version="1" comment="libmodplug-devel is &lt;0.3.19-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603269" version="1" comment="libmodplug1 is &lt;0.3.19-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603270" version="1" comment="libmodplug1-32bit is &lt;0.3.19-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603271" version="1" comment="libopenmpt-devel is &lt;0.3.19-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603272" version="1" comment="libopenmpt0 is &lt;0.3.19-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603273" version="1" comment="libopenmpt0-32bit is &lt;0.3.19-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603274" version="1" comment="libopenmpt_modplug1 is &lt;0.3.19-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603275" version="1" comment="libopenmpt_modplug1-32bit is &lt;0.3.19-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603276" version="1" comment="openmpt123 is &lt;0.3.19-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603834" version="1" comment="freerdp is &lt;2.0.0~rc4-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151908" version="1" comment="freerdp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603835" version="1" comment="freerdp-devel is &lt;2.0.0~rc4-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151909" version="1" comment="freerdp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603836" version="1" comment="freerdp-server is &lt;2.0.0~rc4-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245861" version="1" comment="freerdp-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603837" version="1" comment="freerdp-wayland is &lt;2.0.0~rc4-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245862" version="1" comment="freerdp-wayland is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603838" version="1" comment="libfreerdp2 is &lt;2.0.0~rc4-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154119" version="1" comment="libfreerdp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603839" version="1" comment="libuwac0-0 is &lt;2.0.0~rc4-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245863" version="1" comment="libuwac0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603840" version="1" comment="libwinpr2 is &lt;2.0.0~rc4-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177198" version="1" comment="libwinpr2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603841" version="1" comment="uwac0-0-devel is &lt;2.0.0~rc4-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245864" version="1" comment="uwac0-0-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603842" version="1" comment="winpr2-devel is &lt;2.0.0~rc4-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245865" version="1" comment="winpr2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607145" version="1" comment="python2-salt is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607146" version="1" comment="python3-salt is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607147" version="1" comment="salt is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607148" version="1" comment="salt-api is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607149" version="1" comment="salt-bash-completion is &lt;2019.2.0-lp151.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607150" version="1" comment="salt-cloud is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607151" version="1" comment="salt-doc is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607152" version="1" comment="salt-fish-completion is &lt;2019.2.0-lp151.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607153" version="1" comment="salt-master is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607154" version="1" comment="salt-minion is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607155" version="1" comment="salt-proxy is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607156" version="1" comment="salt-ssh is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607157" version="1" comment="salt-standalone-formulas-configuration is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607158" version="1" comment="salt-syndic is &lt;2019.2.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607159" version="1" comment="salt-zsh-completion is &lt;2019.2.0-lp151.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603702" version="1" comment="libtomcrypt-devel is &lt;1.17-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270412" version="1" comment="libtomcrypt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603703" version="1" comment="libtomcrypt-examples is &lt;1.17-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270413" version="1" comment="libtomcrypt-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603704" version="1" comment="libtomcrypt0 is &lt;1.17-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270414" version="1" comment="libtomcrypt0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608819" version="1" comment="libntlm-devel is &lt;1.6-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285686" version="1" comment="libntlm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608820" version="1" comment="libntlm0 is &lt;1.6-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285687" version="1" comment="libntlm0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606515" version="1" comment="libssh2-1 is &lt;1.9.0-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152658" version="1" comment="libssh2-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606516" version="1" comment="libssh2-1-32bit is &lt;1.9.0-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153297" version="1" comment="libssh2-1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606517" version="1" comment="libssh2-devel is &lt;1.9.0-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153298" version="1" comment="libssh2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603388" version="1" comment="liblz4-1 is &lt;1.8.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268961" version="1" comment="liblz4-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603389" version="1" comment="liblz4-1-32bit is &lt;1.8.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268962" version="1" comment="liblz4-1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603390" version="1" comment="liblz4-devel is &lt;1.8.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268963" version="1" comment="liblz4-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603391" version="1" comment="lz4 is &lt;1.8.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268964" version="1" comment="lz4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609794" version="1" comment="gdal is &lt;2.4.3-lp151.3.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270435" version="1" comment="gdal is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609795" version="1" comment="gdal-devel is &lt;2.4.3-lp151.3.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270436" version="1" comment="gdal-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609796" version="1" comment="libgdal20 is &lt;2.4.3-lp151.3.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270437" version="1" comment="libgdal20 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609797" version="1" comment="perl-gdal is &lt;2.4.3-lp151.3.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270438" version="1" comment="perl-gdal is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609798" version="1" comment="python2-GDAL is &lt;2.4.3-lp151.3.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270439" version="1" comment="python2-GDAL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609799" version="1" comment="python3-GDAL is &lt;2.4.3-lp151.3.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009270440" version="1" comment="python3-GDAL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609009" version="1" comment="xmlgraphics-batik is &lt;1.9-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286257" version="1" comment="xmlgraphics-batik is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609010" version="1" comment="xmlgraphics-batik-demo is &lt;1.9-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286258" version="1" comment="xmlgraphics-batik-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609011" version="1" comment="xmlgraphics-batik-rasterizer is &lt;1.9-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286259" version="1" comment="xmlgraphics-batik-rasterizer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609012" version="1" comment="xmlgraphics-batik-slideshow is &lt;1.9-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286260" version="1" comment="xmlgraphics-batik-slideshow is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609013" version="1" comment="xmlgraphics-batik-squiggle is &lt;1.9-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286261" version="1" comment="xmlgraphics-batik-squiggle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609014" version="1" comment="xmlgraphics-batik-svgpp is &lt;1.9-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286262" version="1" comment="xmlgraphics-batik-svgpp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609015" version="1" comment="xmlgraphics-batik-ttf2svg is &lt;1.9-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286263" version="1" comment="xmlgraphics-batik-ttf2svg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607134" version="1" comment="tomcat is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607135" version="1" comment="tomcat-admin-webapps is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607136" version="1" comment="tomcat-docs-webapp is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607137" version="1" comment="tomcat-el-3_0-api is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607138" version="1" comment="tomcat-embed is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607139" version="1" comment="tomcat-javadoc is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607140" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607141" version="1" comment="tomcat-jsvc is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607142" version="1" comment="tomcat-lib is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607143" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607144" version="1" comment="tomcat-webapps is &lt;9.0.31-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607513" version="1" comment="log4j is &lt;1.2.17-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275808" version="1" comment="log4j is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607514" version="1" comment="log4j-javadoc is &lt;1.2.17-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275809" version="1" comment="log4j-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607515" version="1" comment="log4j-manual is &lt;1.2.17-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275810" version="1" comment="log4j-manual is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607516" version="1" comment="log4j-mini is &lt;1.2.17-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275811" version="1" comment="log4j-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603747" version="1" comment="libncurses5 is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158856" version="1" comment="libncurses5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603748" version="1" comment="libncurses5-32bit is &lt;6.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158857" version="1" comment="libncurses5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603749" version="1" comment="libncurses6 is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158858" version="1" comment="libncurses6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603750" version="1" comment="libncurses6-32bit is &lt;6.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158859" version="1" comment="libncurses6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603751" version="1" comment="ncurses-devel is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158861" version="1" comment="ncurses-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603752" version="1" comment="ncurses-devel-32bit is &lt;6.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158862" version="1" comment="ncurses-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603753" version="1" comment="ncurses-utils is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158863" version="1" comment="ncurses-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603754" version="1" comment="ncurses5-devel is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241509" version="1" comment="ncurses5-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603755" version="1" comment="ncurses5-devel-32bit is &lt;6.1-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241510" version="1" comment="ncurses5-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603756" version="1" comment="tack is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158864" version="1" comment="tack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603757" version="1" comment="terminfo is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158865" version="1" comment="terminfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603758" version="1" comment="terminfo-base is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158866" version="1" comment="terminfo-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603759" version="1" comment="terminfo-iterm is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241511" version="1" comment="terminfo-iterm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603760" version="1" comment="terminfo-screen is &lt;6.1-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241512" version="1" comment="terminfo-screen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605493" version="1" comment="python2-reportlab is &lt;3.4.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277408" version="1" comment="python2-reportlab is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605494" version="1" comment="python3-reportlab is &lt;3.4.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277409" version="1" comment="python3-reportlab is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606104" version="1" comment="chromedriver is &lt;80.0.3987.87-lp151.2.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606105" version="1" comment="chromium is &lt;80.0.3987.87-lp151.2.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607977" version="1" comment="file is &lt;5.32-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151700" version="1" comment="file is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607978" version="1" comment="file-devel is &lt;5.32-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151701" version="1" comment="file-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607979" version="1" comment="file-devel-32bit is &lt;5.32-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246003" version="1" comment="file-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607980" version="1" comment="file-magic is &lt;5.32-lp151.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151702" version="1" comment="file-magic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607981" version="1" comment="libmagic1 is &lt;5.32-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151703" version="1" comment="libmagic1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607982" version="1" comment="libmagic1-32bit is &lt;5.32-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151704" version="1" comment="libmagic1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607983" version="1" comment="python2-magic is &lt;5.32-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246004" version="1" comment="python2-magic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607984" version="1" comment="python3-magic is &lt;5.32-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009246005" version="1" comment="python3-magic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603867" version="1" comment="haproxy is &lt;2.0.10+git0.ac198b92-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608062" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608063" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-lp151.10.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608064" version="1" comment="python is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608065" version="1" comment="python-32bit is &lt;2.7.17-lp151.10.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608066" version="1" comment="python-base is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608067" version="1" comment="python-base-32bit is &lt;2.7.17-lp151.10.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608068" version="1" comment="python-curses is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608069" version="1" comment="python-demo is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608070" version="1" comment="python-devel is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608071" version="1" comment="python-doc is &lt;2.7.17-lp151.10.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608072" version="1" comment="python-doc-pdf is &lt;2.7.17-lp151.10.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608073" version="1" comment="python-gdbm is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608074" version="1" comment="python-idle is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608075" version="1" comment="python-tk is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608076" version="1" comment="python-xml is &lt;2.7.17-lp151.10.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607667" version="1" comment="libvirglrenderer0 is &lt;0.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154205" version="1" comment="libvirglrenderer0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607668" version="1" comment="virglrenderer-devel is &lt;0.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154207" version="1" comment="virglrenderer-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607669" version="1" comment="virglrenderer-test-server is &lt;0.6.0-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154208" version="1" comment="virglrenderer-test-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607301" version="1" comment="cni is &lt;0.7.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280793" version="1" comment="cni is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607302" version="1" comment="cni-plugins is &lt;0.8.4-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280794" version="1" comment="cni-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607303" version="1" comment="conmon is &lt;2.0.10-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280795" version="1" comment="conmon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607304" version="1" comment="fuse-overlayfs is &lt;0.7.6-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607305" version="1" comment="podman is &lt;1.8.0-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607306" version="1" comment="podman-cni-config is &lt;1.8.0-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606936" version="1" comment="sudo is &lt;1.8.22-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606937" version="1" comment="sudo-devel is &lt;1.8.22-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606938" version="1" comment="sudo-test is &lt;1.8.22-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607233" version="1" comment="libnghttp2-14 is &lt;1.40.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153583" version="1" comment="libnghttp2-14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607234" version="1" comment="libnghttp2-14-32bit is &lt;1.40.0-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177223" version="1" comment="libnghttp2-14-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607235" version="1" comment="libnghttp2-devel is &lt;1.40.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153584" version="1" comment="libnghttp2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607236" version="1" comment="libnghttp2_asio-devel is &lt;1.40.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153585" version="1" comment="libnghttp2_asio-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607237" version="1" comment="libnghttp2_asio1 is &lt;1.40.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153586" version="1" comment="libnghttp2_asio1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607238" version="1" comment="libnghttp2_asio1-32bit is &lt;1.40.0-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267106" version="1" comment="libnghttp2_asio1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607239" version="1" comment="nghttp2 is &lt;1.40.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153587" version="1" comment="nghttp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607240" version="1" comment="python3-nghttp2 is &lt;1.40.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267108" version="1" comment="python3-nghttp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603786" version="1" comment="djvulibre is &lt;3.5.27-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603787" version="1" comment="djvulibre-doc is &lt;3.5.27-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603788" version="1" comment="libdjvulibre-devel is &lt;3.5.27-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603789" version="1" comment="libdjvulibre21 is &lt;3.5.27-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608209" version="1" comment="libtspi1 is &lt;0.3.14-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275710" version="1" comment="libtspi1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608210" version="1" comment="libtspi1-32bit is &lt;0.3.14-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275711" version="1" comment="libtspi1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608211" version="1" comment="trousers is &lt;0.3.14-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275712" version="1" comment="trousers is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608212" version="1" comment="trousers-devel is &lt;0.3.14-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275713" version="1" comment="trousers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604918" version="1" comment="apt-cacher-ng is &lt;3.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277153" version="1" comment="apt-cacher-ng is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606943" version="1" comment="libsolv-demo is &lt;0.7.10-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606944" version="1" comment="libsolv-devel is &lt;0.7.10-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606945" version="1" comment="libsolv-tools is &lt;0.7.10-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606946" version="1" comment="libzypp is &lt;17.19.0-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606947" version="1" comment="libzypp-devel is &lt;17.19.0-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606948" version="1" comment="libzypp-devel-doc is &lt;17.19.0-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606949" version="1" comment="perl-solv is &lt;0.7.10-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606950" version="1" comment="python-solv is &lt;0.7.10-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606951" version="1" comment="python3-solv is &lt;0.7.10-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606952" version="1" comment="ruby-solv is &lt;0.7.10-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606953" version="1" comment="zypper is &lt;1.14.33-lp151.2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606954" version="1" comment="zypper-aptitude is &lt;1.14.33-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606955" version="1" comment="zypper-log is &lt;1.14.33-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606956" version="1" comment="zypper-needs-restarting is &lt;1.14.33-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606995" version="1" comment="libmysqld-devel is &lt;10.2.31-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152840" version="1" comment="libmysqld-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606996" version="1" comment="libmysqld19 is &lt;10.2.31-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177123" version="1" comment="libmysqld19 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606997" version="1" comment="mariadb is &lt;10.2.31-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151099" version="1" comment="mariadb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606998" version="1" comment="mariadb-bench is &lt;10.2.31-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152841" version="1" comment="mariadb-bench is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606999" version="1" comment="mariadb-client is &lt;10.2.31-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151100" version="1" comment="mariadb-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607000" version="1" comment="mariadb-errormessages is &lt;10.2.31-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151101" version="1" comment="mariadb-errormessages is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607001" version="1" comment="mariadb-galera is &lt;10.2.31-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178284" version="1" comment="mariadb-galera is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607002" version="1" comment="mariadb-test is &lt;10.2.31-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152842" version="1" comment="mariadb-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607003" version="1" comment="mariadb-tools is &lt;10.2.31-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152843" version="1" comment="mariadb-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605508" version="1" comment="wicked is &lt;0.6.60-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277410" version="1" comment="wicked is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605509" version="1" comment="wicked-service is &lt;0.6.60-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277411" version="1" comment="wicked-service is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606390" version="1" comment="wicked is &lt;0.6.60-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606391" version="1" comment="wicked-service is &lt;0.6.60-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606923" version="1" comment="rmt-server is &lt;2.5.2-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606924" version="1" comment="rmt-server-config is &lt;2.5.2-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606925" version="1" comment="rmt-server-pubcloud is &lt;2.5.2-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607975" version="1" comment="autoyast2 is &lt;4.1.15-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283676" version="1" comment="autoyast2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607976" version="1" comment="autoyast2-installation is &lt;4.1.15-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283677" version="1" comment="autoyast2-installation is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604581" version="1" comment="sarg is &lt;2.3.10-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277117" version="1" comment="sarg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609138" version="1" comment="libunbound-devel-mini is &lt;1.6.8-lp151.8.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286672" version="1" comment="libunbound-devel-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609139" version="1" comment="libunbound2 is &lt;1.6.8-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177204" version="1" comment="libunbound2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609140" version="1" comment="unbound is &lt;1.6.8-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286673" version="1" comment="unbound is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609141" version="1" comment="unbound-anchor is &lt;1.6.8-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177205" version="1" comment="unbound-anchor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609142" version="1" comment="unbound-devel is &lt;1.6.8-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286674" version="1" comment="unbound-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609143" version="1" comment="unbound-munin is &lt;1.6.8-lp151.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286675" version="1" comment="unbound-munin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609144" version="1" comment="unbound-python is &lt;1.6.8-lp151.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286676" version="1" comment="unbound-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609800" version="1" comment="python3-Django is &lt;2.2.8-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606223" version="1" comment="libshibsp-lite7 is &lt;2.6.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275714" version="1" comment="libshibsp-lite7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606224" version="1" comment="libshibsp7 is &lt;2.6.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275715" version="1" comment="libshibsp7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606225" version="1" comment="shibboleth-sp is &lt;2.6.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167896" version="1" comment="shibboleth-sp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606226" version="1" comment="shibboleth-sp-devel is &lt;2.6.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167897" version="1" comment="shibboleth-sp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607663" version="1" comment="python3-typed-ast is &lt;1.3.1-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009282465" version="1" comment="python3-typed-ast is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606503" version="1" comment="dia is &lt;0.97.3-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151163" version="1" comment="dia is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606504" version="1" comment="dia-lang is &lt;0.97.3-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151164" version="1" comment="dia-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604437" version="1" comment="xen is &lt;4.12.1_06-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604438" version="1" comment="xen-devel is &lt;4.12.1_06-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604439" version="1" comment="xen-doc-html is &lt;4.12.1_06-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604440" version="1" comment="xen-libs is &lt;4.12.1_06-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604441" version="1" comment="xen-libs-32bit is &lt;4.12.1_06-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604442" version="1" comment="xen-tools is &lt;4.12.1_06-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604443" version="1" comment="xen-tools-domU is &lt;4.12.1_06-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607664" version="1" comment="libsingularity1 is &lt;2.6.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238039" version="1" comment="libsingularity1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607666" version="1" comment="singularity-devel is &lt;2.6.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238041" version="1" comment="singularity-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608195" version="1" comment="sysstat is &lt;12.0.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608196" version="1" comment="sysstat-isag is &lt;12.0.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607273" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607274" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607275" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607276" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607277" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607278" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607279" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607280" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607281" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607282" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607283" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607284" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607285" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607286" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607287" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607288" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607289" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607290" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607291" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607292" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607293" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607559" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607560" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607561" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607562" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607563" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607564" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607565" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607566" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607567" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607568" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607569" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607570" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607571" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607572" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607573" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607574" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607575" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607576" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607577" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607578" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607579" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605804" version="1" comment="lout is &lt;3.40-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297567" version="1" comment="lout is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606680" version="1" comment="docker-runc is &lt;1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605640" version="1" comment="ImageMagick is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605641" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605642" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605643" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605644" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp151.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605645" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp151.7.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605646" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605647" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605648" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp151.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605649" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605650" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp151.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605651" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605652" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605653" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605654" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605655" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp151.7.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607594" version="1" comment="GraphicsMagick is &lt;1.3.29-lp151.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607595" version="1" comment="GraphicsMagick-devel is &lt;1.3.29-lp151.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607596" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.29-lp151.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607597" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.29-lp151.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607598" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.29-lp151.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607599" version="1" comment="libGraphicsMagick3-config is &lt;1.3.29-lp151.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607600" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.29-lp151.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607601" version="1" comment="perl-GraphicsMagick is &lt;1.3.29-lp151.4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608268" version="1" comment="libxml2-2 is &lt;2.9.7-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151137" version="1" comment="libxml2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608269" version="1" comment="libxml2-2-32bit is &lt;2.9.7-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151138" version="1" comment="libxml2-2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608270" version="1" comment="libxml2-devel is &lt;2.9.7-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151139" version="1" comment="libxml2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608271" version="1" comment="libxml2-devel-32bit is &lt;2.9.7-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152663" version="1" comment="libxml2-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608272" version="1" comment="libxml2-doc is &lt;2.9.7-lp151.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152664" version="1" comment="libxml2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608273" version="1" comment="libxml2-tools is &lt;2.9.7-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151140" version="1" comment="libxml2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608274" version="1" comment="python2-libxml2-python is &lt;2.9.7-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237173" version="1" comment="python2-libxml2-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608275" version="1" comment="python3-libxml2-python is &lt;2.9.7-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177126" version="1" comment="python3-libxml2-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608026" version="1" comment="libredwg-devel is &lt;0.9.3-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276137" version="1" comment="libredwg-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608027" version="1" comment="libredwg-tools is &lt;0.9.3-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276138" version="1" comment="libredwg-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608028" version="1" comment="libredwg0 is &lt;0.9.3-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276139" version="1" comment="libredwg0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608023" version="1" comment="libbsd-ctor-static is &lt;0.8.7-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283679" version="1" comment="libbsd-ctor-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608024" version="1" comment="libbsd-devel is &lt;0.8.7-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283680" version="1" comment="libbsd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608025" version="1" comment="libbsd0 is &lt;0.8.7-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283681" version="1" comment="libbsd0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606328" version="1" comment="nginx is &lt;1.14.2-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606329" version="1" comment="nginx-source is &lt;1.14.2-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606330" version="1" comment="vim-plugin-nginx is &lt;1.14.2-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606392" version="1" comment="libsystemd0 is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154102" version="1" comment="libsystemd0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606393" version="1" comment="libsystemd0-32bit is &lt;234-lp151.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154103" version="1" comment="libsystemd0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606394" version="1" comment="libsystemd0-mini is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154202" version="1" comment="libsystemd0-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606395" version="1" comment="libudev-devel is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151690" version="1" comment="libudev-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606396" version="1" comment="libudev-devel-32bit is &lt;234-lp151.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239129" version="1" comment="libudev-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606397" version="1" comment="libudev-mini-devel is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152578" version="1" comment="libudev-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606398" version="1" comment="libudev-mini1 is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152579" version="1" comment="libudev-mini1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606399" version="1" comment="libudev1 is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151691" version="1" comment="libudev1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606400" version="1" comment="libudev1-32bit is &lt;234-lp151.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151692" version="1" comment="libudev1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606401" version="1" comment="nss-myhostname is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152580" version="1" comment="nss-myhostname is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606402" version="1" comment="nss-myhostname-32bit is &lt;234-lp151.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152581" version="1" comment="nss-myhostname-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606403" version="1" comment="nss-mymachines is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154203" version="1" comment="nss-mymachines is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606404" version="1" comment="nss-mymachines-32bit is &lt;234-lp151.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239130" version="1" comment="nss-mymachines-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606405" version="1" comment="nss-systemd is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239131" version="1" comment="nss-systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606406" version="1" comment="systemd is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151693" version="1" comment="systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606407" version="1" comment="systemd-32bit is &lt;234-lp151.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151694" version="1" comment="systemd-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606408" version="1" comment="systemd-bash-completion is &lt;234-lp151.26.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151695" version="1" comment="systemd-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606409" version="1" comment="systemd-container is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239132" version="1" comment="systemd-container is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606410" version="1" comment="systemd-coredump is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239133" version="1" comment="systemd-coredump is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606411" version="1" comment="systemd-devel is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152582" version="1" comment="systemd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606412" version="1" comment="systemd-logger is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151696" version="1" comment="systemd-logger is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606413" version="1" comment="systemd-mini is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152584" version="1" comment="systemd-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606414" version="1" comment="systemd-mini-bash-completion is &lt;234-lp151.26.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154204" version="1" comment="systemd-mini-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606415" version="1" comment="systemd-mini-container-mini is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239134" version="1" comment="systemd-mini-container-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606416" version="1" comment="systemd-mini-coredump-mini is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239135" version="1" comment="systemd-mini-coredump-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606417" version="1" comment="systemd-mini-devel is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152585" version="1" comment="systemd-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606418" version="1" comment="systemd-mini-sysvinit is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152586" version="1" comment="systemd-mini-sysvinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606419" version="1" comment="systemd-sysvinit is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151697" version="1" comment="systemd-sysvinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606420" version="1" comment="udev is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151699" version="1" comment="udev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606421" version="1" comment="udev-mini is &lt;234-lp151.26.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152587" version="1" comment="udev-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608033" version="1" comment="libxml2-2 is &lt;2.9.7-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608034" version="1" comment="libxml2-2-32bit is &lt;2.9.7-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608035" version="1" comment="libxml2-devel is &lt;2.9.7-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608036" version="1" comment="libxml2-devel-32bit is &lt;2.9.7-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608037" version="1" comment="libxml2-doc is &lt;2.9.7-lp151.5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608038" version="1" comment="libxml2-tools is &lt;2.9.7-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608039" version="1" comment="python2-libxml2-python is &lt;2.9.7-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608040" version="1" comment="python3-libxml2-python is &lt;2.9.7-lp151.5.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607126" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.42.8-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151634" version="1" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607127" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.42.8-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153668" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607128" version="1" comment="librsvg-2-2 is &lt;2.42.8-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151635" version="1" comment="librsvg-2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607129" version="1" comment="librsvg-2-2-32bit is &lt;2.42.8-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153670" version="1" comment="librsvg-2-2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607130" version="1" comment="librsvg-devel is &lt;2.42.8-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151636" version="1" comment="librsvg-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607131" version="1" comment="rsvg-thumbnailer is &lt;2.42.8-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161885" version="1" comment="rsvg-thumbnailer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607132" version="1" comment="rsvg-view is &lt;2.42.8-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153671" version="1" comment="rsvg-view is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607133" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.42.8-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151637" version="1" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607231" version="1" comment="apache2-mod_auth_openidc is &lt;2.3.8-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607063" version="1" comment="MozillaFirefox is &lt;68.6.0-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607064" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.6.0-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607065" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.6.0-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607066" version="1" comment="MozillaFirefox-devel is &lt;68.6.0-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607067" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607068" version="1" comment="MozillaFirefox-translations-other is &lt;68.6.0-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607177" version="1" comment="MozillaThunderbird is &lt;68.6.0-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607178" version="1" comment="MozillaThunderbird-translations-common is &lt;68.6.0-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607179" version="1" comment="MozillaThunderbird-translations-other is &lt;68.6.0-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609801" version="1" comment="chromedriver is &lt;80.0.3987.149-lp151.2.73.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609802" version="1" comment="chromium is &lt;80.0.3987.149-lp151.2.73.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608822" version="1" comment="libvarnishapi2 is &lt;6.2.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608823" version="1" comment="varnish is &lt;6.2.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608824" version="1" comment="varnish-devel is &lt;6.2.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607647" version="1" comment="teeworlds is &lt;0.7.5-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608821" version="1" comment="prboom-plus is &lt;2.5.1.4-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285688" version="1" comment="prboom-plus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608458" version="1" comment="gvim is &lt;8.0.1568-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608459" version="1" comment="vim is &lt;8.0.1568-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608460" version="1" comment="vim-data is &lt;8.0.1568-lp151.5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608461" version="1" comment="vim-data-common is &lt;8.0.1568-lp151.5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604953" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604954" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-lp151.10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604955" version="1" comment="python is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604956" version="1" comment="python-32bit is &lt;2.7.17-lp151.10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604957" version="1" comment="python-base is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604958" version="1" comment="python-base-32bit is &lt;2.7.17-lp151.10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604959" version="1" comment="python-curses is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604960" version="1" comment="python-demo is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604961" version="1" comment="python-devel is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604962" version="1" comment="python-doc is &lt;2.7.17-lp151.10.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604963" version="1" comment="python-doc-pdf is &lt;2.7.17-lp151.10.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604964" version="1" comment="python-gdbm is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604965" version="1" comment="python-idle is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604966" version="1" comment="python-tk is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604967" version="1" comment="python-xml is &lt;2.7.17-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606665" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606666" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-lp151.10.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606681" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606682" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.12-lp151.6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606667" version="1" comment="python is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606668" version="1" comment="python-32bit is &lt;2.7.17-lp151.10.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606669" version="1" comment="python-base is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606670" version="1" comment="python-base-32bit is &lt;2.7.17-lp151.10.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606671" version="1" comment="python-curses is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606672" version="1" comment="python-demo is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606673" version="1" comment="python-devel is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606674" version="1" comment="python-doc is &lt;2.7.17-lp151.10.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606675" version="1" comment="python-doc-pdf is &lt;2.7.17-lp151.10.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606676" version="1" comment="python-gdbm is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606677" version="1" comment="python-idle is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606678" version="1" comment="python-tk is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606679" version="1" comment="python-xml is &lt;2.7.17-lp151.10.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606640" version="1" comment="python2-pip is &lt;10.0.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294865" version="1" comment="python2-pip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606641" version="1" comment="python2-pip-wheel is &lt;10.0.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337921" version="1" comment="python2-pip-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606644" version="1" comment="python2-setuptools is &lt;40.5.0-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303045" version="1" comment="python2-setuptools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606645" version="1" comment="python2-setuptools-test is &lt;40.5.0-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303046" version="1" comment="python2-setuptools-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606646" version="1" comment="python2-setuptools-wheel is &lt;40.5.0-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303047" version="1" comment="python2-setuptools-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606683" version="1" comment="python3 is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606684" version="1" comment="python3-32bit is &lt;3.6.12-lp151.6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606685" version="1" comment="python3-base is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606686" version="1" comment="python3-base-32bit is &lt;3.6.12-lp151.6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606687" version="1" comment="python3-curses is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606688" version="1" comment="python3-dbm is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606689" version="1" comment="python3-devel is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606690" version="1" comment="python3-idle is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606642" version="1" comment="python3-pip is &lt;10.0.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151932" version="1" comment="python3-pip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606643" version="1" comment="python3-pip-wheel is &lt;10.0.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337922" version="1" comment="python3-pip-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606647" version="1" comment="python3-setuptools is &lt;40.5.0-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303048" version="1" comment="python3-setuptools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606648" version="1" comment="python3-setuptools-test is &lt;40.5.0-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303049" version="1" comment="python3-setuptools-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606649" version="1" comment="python3-setuptools-wheel is &lt;40.5.0-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303050" version="1" comment="python3-setuptools-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606691" version="1" comment="python3-testsuite is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606692" version="1" comment="python3-tk is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606693" version="1" comment="python3-tools is &lt;3.6.12-lp151.6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605499" version="1" comment="perl-DBI is &lt;1.639-lp151.3.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609518" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609519" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609520" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609521" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609522" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609523" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609524" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609525" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609526" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609527" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609528" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609529" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609530" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609531" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609532" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609533" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609534" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.91.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609535" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609536" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609537" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609538" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.91.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604374" version="1" comment="libvpx-devel is &lt;1.6.1-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170222" version="1" comment="libvpx-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604375" version="1" comment="libvpx4 is &lt;1.6.1-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177224" version="1" comment="libvpx4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604376" version="1" comment="libvpx4-32bit is &lt;1.6.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277006" version="1" comment="libvpx4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604377" version="1" comment="vpx-tools is &lt;1.6.1-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170228" version="1" comment="vpx-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603725" version="1" comment="libjpeg-turbo is &lt;1.5.3-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152540" version="1" comment="libjpeg-turbo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603726" version="1" comment="libjpeg62 is &lt;62.2.0-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152541" version="1" comment="libjpeg62 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603727" version="1" comment="libjpeg62-32bit is &lt;62.2.0-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166381" version="1" comment="libjpeg62-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603728" version="1" comment="libjpeg62-devel is &lt;62.2.0-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152542" version="1" comment="libjpeg62-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603729" version="1" comment="libjpeg62-devel-32bit is &lt;62.2.0-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166384" version="1" comment="libjpeg62-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603730" version="1" comment="libjpeg62-turbo is &lt;1.5.3-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166386" version="1" comment="libjpeg62-turbo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603731" version="1" comment="libjpeg8 is &lt;8.1.2-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152543" version="1" comment="libjpeg8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603732" version="1" comment="libjpeg8-32bit is &lt;8.1.2-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152544" version="1" comment="libjpeg8-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603733" version="1" comment="libjpeg8-devel is &lt;8.1.2-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166390" version="1" comment="libjpeg8-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603734" version="1" comment="libjpeg8-devel-32bit is &lt;8.1.2-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166392" version="1" comment="libjpeg8-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603735" version="1" comment="libturbojpeg0 is &lt;8.1.2-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152545" version="1" comment="libturbojpeg0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603736" version="1" comment="libturbojpeg0-32bit is &lt;8.1.2-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166395" version="1" comment="libturbojpeg0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607320" version="1" comment="python2-mysql-connector-python is &lt;8.0.19-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280811" version="1" comment="python2-mysql-connector-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607321" version="1" comment="python3-mysql-connector-python is &lt;8.0.19-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280812" version="1" comment="python3-mysql-connector-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602108" version="1" comment="libmariadb-devel is &lt;3.1.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261765" version="1" comment="libmariadb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602109" version="1" comment="libmariadb3 is &lt;3.1.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261766" version="1" comment="libmariadb3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602110" version="1" comment="libmariadb3-32bit is &lt;3.1.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261767" version="1" comment="libmariadb3-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602111" version="1" comment="libmariadb_plugins is &lt;3.1.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261768" version="1" comment="libmariadb_plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602112" version="1" comment="libmariadbprivate is &lt;3.1.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009261769" version="1" comment="libmariadbprivate is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602113" version="1" comment="libmysqld-devel is &lt;10.2.25-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602114" version="1" comment="libmysqld19 is &lt;10.2.25-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602115" version="1" comment="mariadb is &lt;10.2.25-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602116" version="1" comment="mariadb-bench is &lt;10.2.25-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602117" version="1" comment="mariadb-client is &lt;10.2.25-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602118" version="1" comment="mariadb-errormessages is &lt;10.2.25-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602119" version="1" comment="mariadb-galera is &lt;10.2.25-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602120" version="1" comment="mariadb-test is &lt;10.2.25-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602121" version="1" comment="mariadb-tools is &lt;10.2.25-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603932" version="1" comment="libmysqld-devel is &lt;10.2.29-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603933" version="1" comment="libmysqld19 is &lt;10.2.29-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603934" version="1" comment="mariadb is &lt;10.2.29-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603935" version="1" comment="mariadb-bench is &lt;10.2.29-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603936" version="1" comment="mariadb-client is &lt;10.2.29-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603937" version="1" comment="mariadb-errormessages is &lt;10.2.29-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603938" version="1" comment="mariadb-galera is &lt;10.2.29-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603939" version="1" comment="mariadb-test is &lt;10.2.29-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603940" version="1" comment="mariadb-tools is &lt;10.2.29-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602128" version="1" comment="java-11-openjdk is &lt;11.0.4.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231592" version="1" comment="java-11-openjdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602129" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.4.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231593" version="1" comment="java-11-openjdk-accessibility is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602130" version="1" comment="java-11-openjdk-demo is &lt;11.0.4.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231594" version="1" comment="java-11-openjdk-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602131" version="1" comment="java-11-openjdk-devel is &lt;11.0.4.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231595" version="1" comment="java-11-openjdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602132" version="1" comment="java-11-openjdk-headless is &lt;11.0.4.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231596" version="1" comment="java-11-openjdk-headless is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602133" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.4.0-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231597" version="1" comment="java-11-openjdk-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602134" version="1" comment="java-11-openjdk-jmods is &lt;11.0.4.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231598" version="1" comment="java-11-openjdk-jmods is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602135" version="1" comment="java-11-openjdk-src is &lt;11.0.4.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231599" version="1" comment="java-11-openjdk-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602101" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152674" version="1" comment="java-1_8_0-openjdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602102" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.222-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152835" version="1" comment="java-1_8_0-openjdk-accessibility is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602103" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152836" version="1" comment="java-1_8_0-openjdk-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602104" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152675" version="1" comment="java-1_8_0-openjdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602105" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152676" version="1" comment="java-1_8_0-openjdk-headless is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602106" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.222-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152837" version="1" comment="java-1_8_0-openjdk-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602107" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.222-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152838" version="1" comment="java-1_8_0-openjdk-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603762" version="1" comment="java-11-openjdk is &lt;11.0.5.0-lp151.3.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603763" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.5.0-lp151.3.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603764" version="1" comment="java-11-openjdk-demo is &lt;11.0.5.0-lp151.3.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603765" version="1" comment="java-11-openjdk-devel is &lt;11.0.5.0-lp151.3.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603766" version="1" comment="java-11-openjdk-headless is &lt;11.0.5.0-lp151.3.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603767" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.5.0-lp151.3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603768" version="1" comment="java-11-openjdk-jmods is &lt;11.0.5.0-lp151.3.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603769" version="1" comment="java-11-openjdk-src is &lt;11.0.5.0-lp151.3.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603922" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.232-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603923" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.232-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603924" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.232-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603925" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.232-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603926" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.232-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603927" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.232-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603928" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.232-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609016" version="1" comment="osc is &lt;0.169.1-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151686" version="1" comment="osc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602042" version="1" comment="osc is &lt;0.165.4-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607012" version="1" comment="permissions is &lt;20181116-lp151.4.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273426" version="1" comment="permissions is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607013" version="1" comment="permissions-zypp-plugin is &lt;20181116-lp151.4.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273427" version="1" comment="permissions-zypp-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603890" version="1" comment="permissions is &lt;20181116-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603891" version="1" comment="permissions-zypp-plugin is &lt;20181116-lp151.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603424" version="1" comment="nfs-client is &lt;2.1.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009269093" version="1" comment="nfs-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603425" version="1" comment="nfs-doc is &lt;2.1.1-lp151.7.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009269094" version="1" comment="nfs-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603426" version="1" comment="nfs-kernel-server is &lt;2.1.1-lp151.7.3.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009269095" version="1" comment="nfs-kernel-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603879" version="1" comment="libmunge2 is &lt;0.5.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273428" version="1" comment="libmunge2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603880" version="1" comment="libmunge2-32bit is &lt;0.5.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273429" version="1" comment="libmunge2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603881" version="1" comment="munge is &lt;0.5.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273430" version="1" comment="munge is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603882" version="1" comment="munge-devel is &lt;0.5.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273431" version="1" comment="munge-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603883" version="1" comment="munge-devel-32bit is &lt;0.5.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273432" version="1" comment="munge-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606905" version="1" comment="inn is &lt;2.5.4-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278741" version="1" comment="inn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606906" version="1" comment="inn-devel is &lt;2.5.4-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278742" version="1" comment="inn-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606907" version="1" comment="mininews is &lt;2.5.4-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278743" version="1" comment="mininews is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605284" version="1" comment="mailman is &lt;2.1.29-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151563" version="1" comment="mailman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606524" version="1" comment="libpcp-devel is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278440" version="1" comment="libpcp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606525" version="1" comment="libpcp3 is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278441" version="1" comment="libpcp3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606526" version="1" comment="libpcp_gui2 is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278442" version="1" comment="libpcp_gui2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606527" version="1" comment="libpcp_import1 is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278443" version="1" comment="libpcp_import1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606528" version="1" comment="libpcp_mmv1 is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278444" version="1" comment="libpcp_mmv1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606529" version="1" comment="libpcp_trace2 is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278445" version="1" comment="libpcp_trace2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606530" version="1" comment="libpcp_web1 is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278446" version="1" comment="libpcp_web1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606531" version="1" comment="pcp is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278447" version="1" comment="pcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606532" version="1" comment="pcp-conf is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278448" version="1" comment="pcp-conf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606533" version="1" comment="pcp-devel is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278449" version="1" comment="pcp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606534" version="1" comment="pcp-doc is &lt;4.3.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278450" version="1" comment="pcp-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606535" version="1" comment="pcp-export-pcp2elasticsearch is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278451" version="1" comment="pcp-export-pcp2elasticsearch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606536" version="1" comment="pcp-export-pcp2graphite is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278452" version="1" comment="pcp-export-pcp2graphite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606537" version="1" comment="pcp-export-pcp2influxdb is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278453" version="1" comment="pcp-export-pcp2influxdb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606538" version="1" comment="pcp-export-pcp2json is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278454" version="1" comment="pcp-export-pcp2json is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606539" version="1" comment="pcp-export-pcp2spark is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278455" version="1" comment="pcp-export-pcp2spark is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606540" version="1" comment="pcp-export-pcp2xml is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278456" version="1" comment="pcp-export-pcp2xml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606541" version="1" comment="pcp-export-pcp2zabbix is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278457" version="1" comment="pcp-export-pcp2zabbix is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606542" version="1" comment="pcp-export-zabbix-agent is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278458" version="1" comment="pcp-export-zabbix-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606543" version="1" comment="pcp-gui is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278459" version="1" comment="pcp-gui is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606544" version="1" comment="pcp-import-collectl2pcp is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278460" version="1" comment="pcp-import-collectl2pcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606545" version="1" comment="pcp-import-ganglia2pcp is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278461" version="1" comment="pcp-import-ganglia2pcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606546" version="1" comment="pcp-import-iostat2pcp is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278462" version="1" comment="pcp-import-iostat2pcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606547" version="1" comment="pcp-import-mrtg2pcp is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278463" version="1" comment="pcp-import-mrtg2pcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606548" version="1" comment="pcp-import-sar2pcp is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278464" version="1" comment="pcp-import-sar2pcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606549" version="1" comment="pcp-manager is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278465" version="1" comment="pcp-manager is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606550" version="1" comment="pcp-pmda-activemq is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278466" version="1" comment="pcp-pmda-activemq is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606551" version="1" comment="pcp-pmda-apache is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278467" version="1" comment="pcp-pmda-apache is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606552" version="1" comment="pcp-pmda-bash is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278468" version="1" comment="pcp-pmda-bash is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606553" version="1" comment="pcp-pmda-bind2 is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278469" version="1" comment="pcp-pmda-bind2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606554" version="1" comment="pcp-pmda-bonding is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278470" version="1" comment="pcp-pmda-bonding is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606555" version="1" comment="pcp-pmda-cifs is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278471" version="1" comment="pcp-pmda-cifs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606556" version="1" comment="pcp-pmda-cisco is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278472" version="1" comment="pcp-pmda-cisco is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606557" version="1" comment="pcp-pmda-dbping is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278473" version="1" comment="pcp-pmda-dbping is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606558" version="1" comment="pcp-pmda-dm is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278474" version="1" comment="pcp-pmda-dm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606559" version="1" comment="pcp-pmda-docker is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278475" version="1" comment="pcp-pmda-docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606560" version="1" comment="pcp-pmda-ds389 is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278476" version="1" comment="pcp-pmda-ds389 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606561" version="1" comment="pcp-pmda-ds389log is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278477" version="1" comment="pcp-pmda-ds389log is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606562" version="1" comment="pcp-pmda-elasticsearch is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278478" version="1" comment="pcp-pmda-elasticsearch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606563" version="1" comment="pcp-pmda-gfs2 is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278479" version="1" comment="pcp-pmda-gfs2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606564" version="1" comment="pcp-pmda-gluster is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278480" version="1" comment="pcp-pmda-gluster is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606565" version="1" comment="pcp-pmda-gpfs is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278481" version="1" comment="pcp-pmda-gpfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606566" version="1" comment="pcp-pmda-gpsd is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278482" version="1" comment="pcp-pmda-gpsd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606567" version="1" comment="pcp-pmda-haproxy is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278483" version="1" comment="pcp-pmda-haproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606568" version="1" comment="pcp-pmda-infiniband is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278484" version="1" comment="pcp-pmda-infiniband is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606569" version="1" comment="pcp-pmda-json is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278485" version="1" comment="pcp-pmda-json is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606570" version="1" comment="pcp-pmda-lmsensors is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278486" version="1" comment="pcp-pmda-lmsensors is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606571" version="1" comment="pcp-pmda-logger is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278487" version="1" comment="pcp-pmda-logger is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606572" version="1" comment="pcp-pmda-lustre is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278488" version="1" comment="pcp-pmda-lustre is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606573" version="1" comment="pcp-pmda-lustrecomm is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278489" version="1" comment="pcp-pmda-lustrecomm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606574" version="1" comment="pcp-pmda-mailq is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278490" version="1" comment="pcp-pmda-mailq is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606575" version="1" comment="pcp-pmda-memcache is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278491" version="1" comment="pcp-pmda-memcache is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606576" version="1" comment="pcp-pmda-mic is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278492" version="1" comment="pcp-pmda-mic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606577" version="1" comment="pcp-pmda-mounts is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278493" version="1" comment="pcp-pmda-mounts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606578" version="1" comment="pcp-pmda-mysql is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278494" version="1" comment="pcp-pmda-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606579" version="1" comment="pcp-pmda-named is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278495" version="1" comment="pcp-pmda-named is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606580" version="1" comment="pcp-pmda-netfilter is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278496" version="1" comment="pcp-pmda-netfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606581" version="1" comment="pcp-pmda-news is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278497" version="1" comment="pcp-pmda-news is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606582" version="1" comment="pcp-pmda-nfsclient is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278498" version="1" comment="pcp-pmda-nfsclient is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606583" version="1" comment="pcp-pmda-nginx is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278499" version="1" comment="pcp-pmda-nginx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606584" version="1" comment="pcp-pmda-nutcracker is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278500" version="1" comment="pcp-pmda-nutcracker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606585" version="1" comment="pcp-pmda-nvidia-gpu is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278501" version="1" comment="pcp-pmda-nvidia-gpu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606586" version="1" comment="pcp-pmda-oracle is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278502" version="1" comment="pcp-pmda-oracle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606587" version="1" comment="pcp-pmda-papi is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278503" version="1" comment="pcp-pmda-papi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606588" version="1" comment="pcp-pmda-pdns is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278504" version="1" comment="pcp-pmda-pdns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606589" version="1" comment="pcp-pmda-perfevent is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278505" version="1" comment="pcp-pmda-perfevent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606590" version="1" comment="pcp-pmda-postfix is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278506" version="1" comment="pcp-pmda-postfix is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606591" version="1" comment="pcp-pmda-prometheus is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278507" version="1" comment="pcp-pmda-prometheus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606592" version="1" comment="pcp-pmda-redis is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278508" version="1" comment="pcp-pmda-redis is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606593" version="1" comment="pcp-pmda-roomtemp is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278509" version="1" comment="pcp-pmda-roomtemp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606594" version="1" comment="pcp-pmda-rpm is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278510" version="1" comment="pcp-pmda-rpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606595" version="1" comment="pcp-pmda-rsyslog is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278511" version="1" comment="pcp-pmda-rsyslog is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606596" version="1" comment="pcp-pmda-samba is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278512" version="1" comment="pcp-pmda-samba is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606597" version="1" comment="pcp-pmda-sendmail is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278513" version="1" comment="pcp-pmda-sendmail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606598" version="1" comment="pcp-pmda-shping is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278514" version="1" comment="pcp-pmda-shping is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606599" version="1" comment="pcp-pmda-slurm is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278515" version="1" comment="pcp-pmda-slurm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606600" version="1" comment="pcp-pmda-smart is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278516" version="1" comment="pcp-pmda-smart is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606601" version="1" comment="pcp-pmda-snmp is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278517" version="1" comment="pcp-pmda-snmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606602" version="1" comment="pcp-pmda-summary is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278518" version="1" comment="pcp-pmda-summary is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606603" version="1" comment="pcp-pmda-systemd is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278519" version="1" comment="pcp-pmda-systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606604" version="1" comment="pcp-pmda-trace is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278520" version="1" comment="pcp-pmda-trace is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606605" version="1" comment="pcp-pmda-unbound is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278521" version="1" comment="pcp-pmda-unbound is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606606" version="1" comment="pcp-pmda-vmware is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278522" version="1" comment="pcp-pmda-vmware is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606607" version="1" comment="pcp-pmda-weblog is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278523" version="1" comment="pcp-pmda-weblog is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606608" version="1" comment="pcp-pmda-zimbra is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278524" version="1" comment="pcp-pmda-zimbra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606609" version="1" comment="pcp-pmda-zswap is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278525" version="1" comment="pcp-pmda-zswap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606610" version="1" comment="pcp-system-tools is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278526" version="1" comment="pcp-system-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606611" version="1" comment="pcp-testsuite is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278527" version="1" comment="pcp-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606612" version="1" comment="pcp-webapi is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278528" version="1" comment="pcp-webapi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606613" version="1" comment="pcp-zeroconf is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278529" version="1" comment="pcp-zeroconf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606614" version="1" comment="perl-PCP-LogImport is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278530" version="1" comment="perl-PCP-LogImport is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606615" version="1" comment="perl-PCP-LogSummary is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278531" version="1" comment="perl-PCP-LogSummary is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606616" version="1" comment="perl-PCP-MMV is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278532" version="1" comment="perl-PCP-MMV is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606617" version="1" comment="perl-PCP-PMDA is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278533" version="1" comment="perl-PCP-PMDA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606618" version="1" comment="python3-pcp is &lt;4.3.1-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278534" version="1" comment="python3-pcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601526" version="1" comment="gnome-shell is &lt;3.26.2+20180130.0d9c74212-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151510" version="1" comment="gnome-shell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601527" version="1" comment="gnome-shell-browser-plugin is &lt;3.26.2+20180130.0d9c74212-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151511" version="1" comment="gnome-shell-browser-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601528" version="1" comment="gnome-shell-calendar is &lt;3.26.2+20180130.0d9c74212-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151512" version="1" comment="gnome-shell-calendar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601529" version="1" comment="gnome-shell-devel is &lt;3.26.2+20180130.0d9c74212-lp151.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162388" version="1" comment="gnome-shell-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601530" version="1" comment="gnome-shell-lang is &lt;3.26.2+20180130.0d9c74212-lp151.7.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151513" version="1" comment="gnome-shell-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608573" version="1" comment="ruby2.5-rubygem-bundler is &lt;1.16.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285430" version="1" comment="ruby2.5-rubygem-bundler is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608574" version="1" comment="ruby2.5-rubygem-bundler-doc is &lt;1.16.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285431" version="1" comment="ruby2.5-rubygem-bundler-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609050" version="1" comment="mercurial is &lt;4.5.2-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153633" version="1" comment="mercurial is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609051" version="1" comment="mercurial-lang is &lt;4.5.2-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153634" version="1" comment="mercurial-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601391" version="1" comment="system-user-root is &lt;20190513-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256071" version="1" comment="system-user-root is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608847" version="1" comment="Mesa is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276538" version="1" comment="Mesa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608848" version="1" comment="Mesa-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276539" version="1" comment="Mesa-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608849" version="1" comment="Mesa-KHR-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276540" version="1" comment="Mesa-KHR-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608850" version="1" comment="Mesa-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276541" version="1" comment="Mesa-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608851" version="1" comment="Mesa-dri is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276542" version="1" comment="Mesa-dri is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608852" version="1" comment="Mesa-dri-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276543" version="1" comment="Mesa-dri-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608853" version="1" comment="Mesa-dri-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276544" version="1" comment="Mesa-dri-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608854" version="1" comment="Mesa-dri-nouveau is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276545" version="1" comment="Mesa-dri-nouveau is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608855" version="1" comment="Mesa-dri-nouveau-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276546" version="1" comment="Mesa-dri-nouveau-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608856" version="1" comment="Mesa-gallium is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276548" version="1" comment="Mesa-gallium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608857" version="1" comment="Mesa-gallium-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276549" version="1" comment="Mesa-gallium-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608858" version="1" comment="Mesa-libEGL-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276550" version="1" comment="Mesa-libEGL-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608859" version="1" comment="Mesa-libEGL1 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276551" version="1" comment="Mesa-libEGL1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608860" version="1" comment="Mesa-libEGL1-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276552" version="1" comment="Mesa-libEGL1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608861" version="1" comment="Mesa-libGL-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276553" version="1" comment="Mesa-libGL-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608862" version="1" comment="Mesa-libGL1 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276554" version="1" comment="Mesa-libGL1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608863" version="1" comment="Mesa-libGL1-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276555" version="1" comment="Mesa-libGL1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608864" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276556" version="1" comment="Mesa-libGLESv1_CM-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608865" version="1" comment="Mesa-libGLESv1_CM1 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276557" version="1" comment="Mesa-libGLESv1_CM1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608866" version="1" comment="Mesa-libGLESv2-2 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276558" version="1" comment="Mesa-libGLESv2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608867" version="1" comment="Mesa-libGLESv2-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276559" version="1" comment="Mesa-libGLESv2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608868" version="1" comment="Mesa-libGLESv3-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276560" version="1" comment="Mesa-libGLESv3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608869" version="1" comment="Mesa-libOpenCL is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276561" version="1" comment="Mesa-libOpenCL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608870" version="1" comment="Mesa-libVulkan-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276562" version="1" comment="Mesa-libVulkan-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608871" version="1" comment="Mesa-libd3d is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276563" version="1" comment="Mesa-libd3d is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608872" version="1" comment="Mesa-libd3d-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276564" version="1" comment="Mesa-libd3d-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608873" version="1" comment="Mesa-libd3d-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276565" version="1" comment="Mesa-libd3d-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608874" version="1" comment="Mesa-libd3d-devel-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276566" version="1" comment="Mesa-libd3d-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608875" version="1" comment="Mesa-libglapi-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276567" version="1" comment="Mesa-libglapi-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608876" version="1" comment="Mesa-libglapi-devel-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276568" version="1" comment="Mesa-libglapi-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608877" version="1" comment="Mesa-libglapi0 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276569" version="1" comment="Mesa-libglapi0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608878" version="1" comment="Mesa-libglapi0-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276570" version="1" comment="Mesa-libglapi0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608879" version="1" comment="Mesa-libva is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276571" version="1" comment="Mesa-libva is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608880" version="1" comment="libOSMesa-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276572" version="1" comment="libOSMesa-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608881" version="1" comment="libOSMesa-devel-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276573" version="1" comment="libOSMesa-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608882" version="1" comment="libOSMesa8 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276574" version="1" comment="libOSMesa8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608883" version="1" comment="libOSMesa8-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276575" version="1" comment="libOSMesa8-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608884" version="1" comment="libXvMC_nouveau is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276576" version="1" comment="libXvMC_nouveau is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608885" version="1" comment="libXvMC_nouveau-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276577" version="1" comment="libXvMC_nouveau-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608886" version="1" comment="libXvMC_r600 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276578" version="1" comment="libXvMC_r600 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608887" version="1" comment="libXvMC_r600-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276579" version="1" comment="libXvMC_r600-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608888" version="1" comment="libgbm-devel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276580" version="1" comment="libgbm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608889" version="1" comment="libgbm-devel-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276581" version="1" comment="libgbm-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608890" version="1" comment="libgbm1 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276582" version="1" comment="libgbm1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608891" version="1" comment="libgbm1-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276583" version="1" comment="libgbm1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608892" version="1" comment="libvdpau_nouveau is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276584" version="1" comment="libvdpau_nouveau is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608893" version="1" comment="libvdpau_nouveau-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276585" version="1" comment="libvdpau_nouveau-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608894" version="1" comment="libvdpau_r300 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276586" version="1" comment="libvdpau_r300 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608895" version="1" comment="libvdpau_r300-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276587" version="1" comment="libvdpau_r300-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608896" version="1" comment="libvdpau_r600 is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276588" version="1" comment="libvdpau_r600 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608897" version="1" comment="libvdpau_r600-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276589" version="1" comment="libvdpau_r600-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608898" version="1" comment="libvdpau_radeonsi is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276590" version="1" comment="libvdpau_radeonsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608899" version="1" comment="libvdpau_radeonsi-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276591" version="1" comment="libvdpau_radeonsi-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608900" version="1" comment="libvulkan_intel is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276592" version="1" comment="libvulkan_intel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608901" version="1" comment="libvulkan_intel-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276593" version="1" comment="libvulkan_intel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608902" version="1" comment="libvulkan_radeon is &lt;18.3.2-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276594" version="1" comment="libvulkan_radeon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608903" version="1" comment="libvulkan_radeon-32bit is &lt;18.3.2-lp151.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276595" version="1" comment="libvulkan_radeon-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608904" version="1" comment="libxatracker-devel is &lt;1.0.0-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276596" version="1" comment="libxatracker-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608905" version="1" comment="libxatracker2 is &lt;1.0.0-lp151.23.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276597" version="1" comment="libxatracker2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609803" version="1" comment="e2fsprogs is &lt;1.43.8-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152602" version="1" comment="e2fsprogs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609804" version="1" comment="e2fsprogs-devel is &lt;1.43.8-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152603" version="1" comment="e2fsprogs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609805" version="1" comment="libcom_err-devel is &lt;1.43.8-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152604" version="1" comment="libcom_err-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609806" version="1" comment="libcom_err-devel-32bit is &lt;1.43.8-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231065" version="1" comment="libcom_err-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609807" version="1" comment="libcom_err-devel-static is &lt;1.43.8-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231066" version="1" comment="libcom_err-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609808" version="1" comment="libcom_err2 is &lt;1.43.8-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152605" version="1" comment="libcom_err2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609809" version="1" comment="libcom_err2-32bit is &lt;1.43.8-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152606" version="1" comment="libcom_err2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609810" version="1" comment="libext2fs-devel is &lt;1.43.8-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152607" version="1" comment="libext2fs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609811" version="1" comment="libext2fs-devel-32bit is &lt;1.43.8-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231067" version="1" comment="libext2fs-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609812" version="1" comment="libext2fs-devel-static is &lt;1.43.8-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231068" version="1" comment="libext2fs-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609813" version="1" comment="libext2fs2 is &lt;1.43.8-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152608" version="1" comment="libext2fs2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609814" version="1" comment="libext2fs2-32bit is &lt;1.43.8-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231069" version="1" comment="libext2fs2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603869" version="1" comment="libshadowsocks-libev2 is &lt;3.3.3-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273433" version="1" comment="libshadowsocks-libev2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603870" version="1" comment="shadowsocks-libev is &lt;3.3.3-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166964" version="1" comment="shadowsocks-libev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603871" version="1" comment="shadowsocks-libev-devel is &lt;3.3.3-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166965" version="1" comment="shadowsocks-libev-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603872" version="1" comment="shadowsocks-libev-doc is &lt;3.3.3-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166966" version="1" comment="shadowsocks-libev-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605533" version="1" comment="e2fsprogs is &lt;1.43.8-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605534" version="1" comment="e2fsprogs-devel is &lt;1.43.8-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605535" version="1" comment="libcom_err-devel is &lt;1.43.8-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605536" version="1" comment="libcom_err-devel-32bit is &lt;1.43.8-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605537" version="1" comment="libcom_err-devel-static is &lt;1.43.8-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605538" version="1" comment="libcom_err2 is &lt;1.43.8-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605539" version="1" comment="libcom_err2-32bit is &lt;1.43.8-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605540" version="1" comment="libext2fs-devel is &lt;1.43.8-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605541" version="1" comment="libext2fs-devel-32bit is &lt;1.43.8-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605542" version="1" comment="libext2fs-devel-static is &lt;1.43.8-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605543" version="1" comment="libext2fs2 is &lt;1.43.8-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605544" version="1" comment="libext2fs2-32bit is &lt;1.43.8-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601397" version="1" comment="curl is &lt;7.60.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151177" version="1" comment="curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601398" version="1" comment="curl-mini is &lt;7.60.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223333" version="1" comment="curl-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601399" version="1" comment="libcurl-devel is &lt;7.60.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151178" version="1" comment="libcurl-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601400" version="1" comment="libcurl-devel-32bit is &lt;7.60.0-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153284" version="1" comment="libcurl-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601401" version="1" comment="libcurl-mini-devel is &lt;7.60.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223334" version="1" comment="libcurl-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601402" version="1" comment="libcurl4 is &lt;7.60.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151179" version="1" comment="libcurl4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601403" version="1" comment="libcurl4-32bit is &lt;7.60.0-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153285" version="1" comment="libcurl4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601404" version="1" comment="libcurl4-mini is &lt;7.60.0-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223335" version="1" comment="libcurl4-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602815" version="1" comment="curl is &lt;7.60.0-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602816" version="1" comment="curl-mini is &lt;7.60.0-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602817" version="1" comment="libcurl-devel is &lt;7.60.0-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602818" version="1" comment="libcurl-devel-32bit is &lt;7.60.0-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602819" version="1" comment="libcurl-mini-devel is &lt;7.60.0-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602820" version="1" comment="libcurl4 is &lt;7.60.0-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602821" version="1" comment="libcurl4-32bit is &lt;7.60.0-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602822" version="1" comment="libcurl4-mini is &lt;7.60.0-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603127" version="1" comment="liblxc-devel is &lt;3.2.1-lp151.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232209" version="1" comment="liblxc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603128" version="1" comment="liblxc1 is &lt;3.2.1-lp151.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232210" version="1" comment="liblxc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603129" version="1" comment="lxc is &lt;3.2.1-lp151.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153860" version="1" comment="lxc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603130" version="1" comment="lxc-bash-completion is &lt;3.2.1-lp151.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252364" version="1" comment="lxc-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603131" version="1" comment="pam_cgfs is &lt;3.2.1-lp151.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252367" version="1" comment="pam_cgfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609815" version="1" comment="chromedriver is &lt;75.0.3770.90-lp151.2.9.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609816" version="1" comment="chromium is &lt;75.0.3770.90-lp151.2.9.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607713" version="1" comment="chromedriver is &lt;79.0.3945.117-lp151.2.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607714" version="1" comment="chromium is &lt;79.0.3945.117-lp151.2.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607715" version="1" comment="libre2-0 is &lt;20200101-lp151.10.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607716" version="1" comment="libre2-0-32bit is &lt;20200101-lp151.10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607717" version="1" comment="re2-devel is &lt;20200101-lp151.10.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602052" version="1" comment="chromedriver is &lt;76.0.3809.87-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602053" version="1" comment="chromium is &lt;76.0.3809.87-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602054" version="1" comment="chromedriver is &lt;76.0.3809.100-lp151.2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602055" version="1" comment="chromium is &lt;76.0.3809.100-lp151.2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602653" version="1" comment="chromedriver is &lt;76.0.3809.132-lp151.2.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602654" version="1" comment="chromium is &lt;76.0.3809.132-lp151.2.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602122" version="1" comment="libpolkit0 is &lt;0.114-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151393" version="1" comment="libpolkit0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602123" version="1" comment="libpolkit0-32bit is &lt;0.114-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152720" version="1" comment="libpolkit0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602124" version="1" comment="polkit is &lt;0.114-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151394" version="1" comment="polkit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602125" version="1" comment="polkit-devel is &lt;0.114-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151395" version="1" comment="polkit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602126" version="1" comment="polkit-doc is &lt;0.114-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152721" version="1" comment="polkit-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602127" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.114-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151396" version="1" comment="typelib-1_0-Polkit-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601840" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152638" version="1" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601841" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.24.2-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152639" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601842" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152640" version="1" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601843" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.24.2-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152641" version="1" comment="libwebkit2gtk-4_0-37-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601844" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.2-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152642" version="1" comment="libwebkit2gtk3-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601845" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152643" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601846" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152644" version="1" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601847" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152645" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601848" version="1" comment="webkit-jsc-4 is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152646" version="1" comment="webkit-jsc-4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601849" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152647" version="1" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601850" version="1" comment="webkit2gtk3-devel is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152649" version="1" comment="webkit2gtk3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601851" version="1" comment="webkit2gtk3-minibrowser is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243274" version="1" comment="webkit2gtk3-minibrowser is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601852" version="1" comment="webkit2gtk3-plugin-process-gtk2 is &lt;2.24.2-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166855" version="1" comment="webkit2gtk3-plugin-process-gtk2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603095" version="1" comment="python2-numpy is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177233" version="1" comment="python2-numpy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603096" version="1" comment="python2-numpy-devel is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245323" version="1" comment="python2-numpy-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603097" version="1" comment="python2-numpy-gnu-hpc is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245324" version="1" comment="python2-numpy-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603098" version="1" comment="python2-numpy-gnu-hpc-devel is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245325" version="1" comment="python2-numpy-gnu-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603099" version="1" comment="python2-numpy_1_16_1-gnu-hpc is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266981" version="1" comment="python2-numpy_1_16_1-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603100" version="1" comment="python2-numpy_1_16_1-gnu-hpc-devel is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266982" version="1" comment="python2-numpy_1_16_1-gnu-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603101" version="1" comment="python3-numpy is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245328" version="1" comment="python3-numpy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603102" version="1" comment="python3-numpy-devel is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245329" version="1" comment="python3-numpy-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603103" version="1" comment="python3-numpy-gnu-hpc is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245330" version="1" comment="python3-numpy-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603104" version="1" comment="python3-numpy-gnu-hpc-devel is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245331" version="1" comment="python3-numpy-gnu-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603105" version="1" comment="python3-numpy_1_16_1-gnu-hpc is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266983" version="1" comment="python3-numpy_1_16_1-gnu-hpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603106" version="1" comment="python3-numpy_1_16_1-gnu-hpc-devel is &lt;1.16.1-lp151.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266984" version="1" comment="python3-numpy_1_16_1-gnu-hpc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603315" version="1" comment="dhcp is &lt;4.3.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151310" version="1" comment="dhcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603316" version="1" comment="dhcp-client is &lt;4.3.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151311" version="1" comment="dhcp-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603317" version="1" comment="dhcp-devel is &lt;4.3.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153188" version="1" comment="dhcp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603318" version="1" comment="dhcp-doc is &lt;4.3.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151312" version="1" comment="dhcp-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603319" version="1" comment="dhcp-relay is &lt;4.3.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151313" version="1" comment="dhcp-relay is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603320" version="1" comment="dhcp-server is &lt;4.3.5-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151314" version="1" comment="dhcp-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603143" version="1" comment="bind is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603144" version="1" comment="bind-chrootenv is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603145" version="1" comment="bind-devel is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603146" version="1" comment="bind-devel-32bit is &lt;9.11.2-lp151.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603147" version="1" comment="bind-doc is &lt;9.11.2-lp151.11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603148" version="1" comment="bind-lwresd is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603149" version="1" comment="bind-utils is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603150" version="1" comment="libbind9-160 is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603151" version="1" comment="libbind9-160-32bit is &lt;9.11.2-lp151.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603152" version="1" comment="libdns169 is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603153" version="1" comment="libdns169-32bit is &lt;9.11.2-lp151.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603154" version="1" comment="libirs-devel is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603155" version="1" comment="libirs160 is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603156" version="1" comment="libirs160-32bit is &lt;9.11.2-lp151.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603157" version="1" comment="libisc166 is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603158" version="1" comment="libisc166-32bit is &lt;9.11.2-lp151.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603159" version="1" comment="libisccc160 is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603160" version="1" comment="libisccc160-32bit is &lt;9.11.2-lp151.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603161" version="1" comment="libisccfg160 is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603162" version="1" comment="libisccfg160-32bit is &lt;9.11.2-lp151.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603163" version="1" comment="liblwres160 is &lt;9.11.2-lp151.11.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603164" version="1" comment="liblwres160-32bit is &lt;9.11.2-lp151.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603165" version="1" comment="python3-bind is &lt;9.11.2-lp151.11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602632" version="1" comment="python-SQLAlchemy-doc is &lt;1.2.14-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263221" version="1" comment="python-SQLAlchemy-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602633" version="1" comment="python2-SQLAlchemy is &lt;1.2.14-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263222" version="1" comment="python2-SQLAlchemy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602634" version="1" comment="python3-SQLAlchemy is &lt;1.2.14-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009263223" version="1" comment="python3-SQLAlchemy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609817" version="1" comment="libBasicUsageEnvironment1 is &lt;2019.06.28-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260574" version="1" comment="libBasicUsageEnvironment1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609818" version="1" comment="libUsageEnvironment3 is &lt;2019.06.28-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260576" version="1" comment="libUsageEnvironment3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609819" version="1" comment="libgroupsock8 is &lt;2019.06.28-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260578" version="1" comment="libgroupsock8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609820" version="1" comment="libliveMedia66 is &lt;2019.06.28-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260580" version="1" comment="libliveMedia66 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609821" version="1" comment="live555 is &lt;2019.06.28-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243095" version="1" comment="live555 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609822" version="1" comment="live555-devel is &lt;2019.06.28-lp151.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243097" version="1" comment="live555-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601627" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601628" version="1" comment="libSDL2-2_0-0-32bit is &lt;2.0.8-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601629" version="1" comment="libSDL2-devel is &lt;2.0.8-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601630" version="1" comment="libSDL2-devel-32bit is &lt;2.0.8-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606265" version="1" comment="chromedriver is &lt;87.0.4280.66-lp151.2.156.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606266" version="1" comment="chromium is &lt;87.0.4280.66-lp151.2.156.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603798" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.26.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603799" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.26.2-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603800" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.26.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603801" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.26.2-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603802" version="1" comment="libwebkit2gtk3-lang is &lt;2.26.2-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603803" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.26.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603804" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.26.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603805" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.26.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603806" version="1" comment="webkit-jsc-4 is &lt;2.26.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603807" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.26.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603808" version="1" comment="webkit2gtk3-devel is &lt;2.26.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603809" version="1" comment="webkit2gtk3-minibrowser is &lt;2.26.2-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603060" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603061" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.24.4-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603062" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603063" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.24.4-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603064" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.4-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603065" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603066" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603067" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603068" version="1" comment="webkit-jsc-4 is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603069" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603070" version="1" comment="webkit2gtk3-devel is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603071" version="1" comment="webkit2gtk3-minibrowser is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603072" version="1" comment="webkit2gtk3-plugin-process-gtk2 is &lt;2.24.4-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603770" version="1" comment="cups is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151184" version="1" comment="cups is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603771" version="1" comment="cups-client is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151185" version="1" comment="cups-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603772" version="1" comment="cups-config is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177129" version="1" comment="cups-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603773" version="1" comment="cups-ddk is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172754" version="1" comment="cups-ddk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603774" version="1" comment="cups-devel is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151186" version="1" comment="cups-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603775" version="1" comment="cups-devel-32bit is &lt;2.2.7-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231804" version="1" comment="cups-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603776" version="1" comment="libcups2 is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177130" version="1" comment="libcups2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603777" version="1" comment="libcups2-32bit is &lt;2.2.7-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231805" version="1" comment="libcups2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603778" version="1" comment="libcupscgi1 is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177131" version="1" comment="libcupscgi1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603779" version="1" comment="libcupscgi1-32bit is &lt;2.2.7-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231806" version="1" comment="libcupscgi1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603780" version="1" comment="libcupsimage2 is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177132" version="1" comment="libcupsimage2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603781" version="1" comment="libcupsimage2-32bit is &lt;2.2.7-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231807" version="1" comment="libcupsimage2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603782" version="1" comment="libcupsmime1 is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177133" version="1" comment="libcupsmime1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603783" version="1" comment="libcupsmime1-32bit is &lt;2.2.7-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231808" version="1" comment="libcupsmime1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603784" version="1" comment="libcupsppdc1 is &lt;2.2.7-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177134" version="1" comment="libcupsppdc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603785" version="1" comment="libcupsppdc1-32bit is &lt;2.2.7-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231809" version="1" comment="libcupsppdc1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606980" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.26.4-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606981" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.26.4-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606982" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.26.4-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606983" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.26.4-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606984" version="1" comment="libwebkit2gtk3-lang is &lt;2.26.4-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606985" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.26.4-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606986" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.26.4-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606987" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.26.4-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606988" version="1" comment="webkit-jsc-4 is &lt;2.26.4-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606989" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.26.4-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606990" version="1" comment="webkit2gtk3-devel is &lt;2.26.4-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606991" version="1" comment="webkit2gtk3-minibrowser is &lt;2.26.4-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603107" version="1" comment="libnghttp2-14 is &lt;1.39.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603108" version="1" comment="libnghttp2-14-32bit is &lt;1.39.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603109" version="1" comment="libnghttp2-devel is &lt;1.39.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603110" version="1" comment="libnghttp2_asio-devel is &lt;1.39.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603111" version="1" comment="libnghttp2_asio1 is &lt;1.39.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603112" version="1" comment="libnghttp2_asio1-32bit is &lt;1.39.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603113" version="1" comment="nghttp2 is &lt;1.39.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602671" version="1" comment="nodejs10 is &lt;10.16.3-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602672" version="1" comment="nodejs10-devel is &lt;10.16.3-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602673" version="1" comment="nodejs10-docs is &lt;10.16.3-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602675" version="1" comment="nodejs8 is &lt;8.16.1-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602676" version="1" comment="nodejs8-devel is &lt;8.16.1-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602677" version="1" comment="nodejs8-docs is &lt;8.16.1-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602674" version="1" comment="npm10 is &lt;10.16.3-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602678" version="1" comment="npm8 is &lt;8.16.1-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603114" version="1" comment="python3-nghttp2 is &lt;1.39.2-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606967" version="1" comment="libpython3_6m1_0 is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606968" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.10-lp151.6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606969" version="1" comment="python3 is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606970" version="1" comment="python3-32bit is &lt;3.6.10-lp151.6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606971" version="1" comment="python3-base is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606972" version="1" comment="python3-base-32bit is &lt;3.6.10-lp151.6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606973" version="1" comment="python3-curses is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606974" version="1" comment="python3-dbm is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606975" version="1" comment="python3-devel is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606976" version="1" comment="python3-idle is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606977" version="1" comment="python3-testsuite is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606978" version="1" comment="python3-tk is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606979" version="1" comment="python3-tools is &lt;3.6.10-lp151.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601405" version="1" comment="cron is &lt;4.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151016" version="1" comment="cron is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601406" version="1" comment="cronie is &lt;1.5.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151017" version="1" comment="cronie is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601407" version="1" comment="cronie-anacron is &lt;1.5.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009256137" version="1" comment="cronie-anacron is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602004" version="1" comment="MozillaThunderbird is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602005" version="1" comment="MozillaThunderbird-buildsymbols is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602006" version="1" comment="MozillaThunderbird-translations-common is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602007" version="1" comment="MozillaThunderbird-translations-other is &lt;60.8.0-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601856" version="1" comment="kernel-firmware is &lt;20190618-lp151.2.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167632" version="1" comment="kernel-firmware is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601857" version="1" comment="ucode-amd is &lt;20190618-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167634" version="1" comment="ucode-amd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602873" version="1" comment="libreoffice is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602874" version="1" comment="libreoffice-base is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602875" version="1" comment="libreoffice-base-drivers-firebird is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602876" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602877" version="1" comment="libreoffice-branding-upstream is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602878" version="1" comment="libreoffice-calc is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602879" version="1" comment="libreoffice-calc-extensions is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602880" version="1" comment="libreoffice-draw is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602881" version="1" comment="libreoffice-filters-optional is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602882" version="1" comment="libreoffice-gdb-pretty-printers is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602883" version="1" comment="libreoffice-glade is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602884" version="1" comment="libreoffice-gnome is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602885" version="1" comment="libreoffice-gtk2 is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602886" version="1" comment="libreoffice-gtk3 is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602887" version="1" comment="libreoffice-icon-themes is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602888" version="1" comment="libreoffice-impress is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602889" version="1" comment="libreoffice-l10n-af is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602890" version="1" comment="libreoffice-l10n-am is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602891" version="1" comment="libreoffice-l10n-ar is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602892" version="1" comment="libreoffice-l10n-as is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602893" version="1" comment="libreoffice-l10n-ast is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602894" version="1" comment="libreoffice-l10n-be is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602895" version="1" comment="libreoffice-l10n-bg is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602896" version="1" comment="libreoffice-l10n-bn is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602897" version="1" comment="libreoffice-l10n-bn_IN is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602898" version="1" comment="libreoffice-l10n-bo is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602899" version="1" comment="libreoffice-l10n-br is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602900" version="1" comment="libreoffice-l10n-brx is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602901" version="1" comment="libreoffice-l10n-bs is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602902" version="1" comment="libreoffice-l10n-ca is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602903" version="1" comment="libreoffice-l10n-ca_valencia is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602904" version="1" comment="libreoffice-l10n-cs is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602905" version="1" comment="libreoffice-l10n-cy is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602906" version="1" comment="libreoffice-l10n-da is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602907" version="1" comment="libreoffice-l10n-de is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602908" version="1" comment="libreoffice-l10n-dgo is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602909" version="1" comment="libreoffice-l10n-dsb is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602910" version="1" comment="libreoffice-l10n-dz is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602911" version="1" comment="libreoffice-l10n-el is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602912" version="1" comment="libreoffice-l10n-en is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602913" version="1" comment="libreoffice-l10n-en_GB is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602914" version="1" comment="libreoffice-l10n-en_ZA is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602915" version="1" comment="libreoffice-l10n-eo is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602916" version="1" comment="libreoffice-l10n-es is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602917" version="1" comment="libreoffice-l10n-et is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602918" version="1" comment="libreoffice-l10n-eu is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602919" version="1" comment="libreoffice-l10n-fa is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602920" version="1" comment="libreoffice-l10n-fi is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602921" version="1" comment="libreoffice-l10n-fr is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602922" version="1" comment="libreoffice-l10n-fy is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602923" version="1" comment="libreoffice-l10n-ga is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602924" version="1" comment="libreoffice-l10n-gd is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602925" version="1" comment="libreoffice-l10n-gl is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602926" version="1" comment="libreoffice-l10n-gu is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602927" version="1" comment="libreoffice-l10n-gug is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602928" version="1" comment="libreoffice-l10n-he is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602929" version="1" comment="libreoffice-l10n-hi is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602930" version="1" comment="libreoffice-l10n-hr is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602931" version="1" comment="libreoffice-l10n-hsb is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602932" version="1" comment="libreoffice-l10n-hu is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602933" version="1" comment="libreoffice-l10n-id is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602934" version="1" comment="libreoffice-l10n-is is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602935" version="1" comment="libreoffice-l10n-it is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602936" version="1" comment="libreoffice-l10n-ja is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602937" version="1" comment="libreoffice-l10n-ka is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602938" version="1" comment="libreoffice-l10n-kab is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602939" version="1" comment="libreoffice-l10n-kk is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602940" version="1" comment="libreoffice-l10n-km is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602941" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602942" version="1" comment="libreoffice-l10n-kn is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602943" version="1" comment="libreoffice-l10n-ko is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602944" version="1" comment="libreoffice-l10n-kok is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602945" version="1" comment="libreoffice-l10n-ks is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602946" version="1" comment="libreoffice-l10n-lb is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602947" version="1" comment="libreoffice-l10n-lo is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602948" version="1" comment="libreoffice-l10n-lt is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602949" version="1" comment="libreoffice-l10n-lv is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602950" version="1" comment="libreoffice-l10n-mai is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602951" version="1" comment="libreoffice-l10n-mk is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602952" version="1" comment="libreoffice-l10n-ml is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602953" version="1" comment="libreoffice-l10n-mn is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602954" version="1" comment="libreoffice-l10n-mni is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602955" version="1" comment="libreoffice-l10n-mr is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602956" version="1" comment="libreoffice-l10n-my is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602957" version="1" comment="libreoffice-l10n-nb is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602958" version="1" comment="libreoffice-l10n-ne is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602959" version="1" comment="libreoffice-l10n-nl is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602960" version="1" comment="libreoffice-l10n-nn is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602961" version="1" comment="libreoffice-l10n-nr is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602962" version="1" comment="libreoffice-l10n-nso is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602963" version="1" comment="libreoffice-l10n-oc is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602964" version="1" comment="libreoffice-l10n-om is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602965" version="1" comment="libreoffice-l10n-or is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602966" version="1" comment="libreoffice-l10n-pa is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602967" version="1" comment="libreoffice-l10n-pl is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602968" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602969" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602970" version="1" comment="libreoffice-l10n-ro is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602971" version="1" comment="libreoffice-l10n-ru is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602972" version="1" comment="libreoffice-l10n-rw is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602973" version="1" comment="libreoffice-l10n-sa_IN is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602974" version="1" comment="libreoffice-l10n-sat is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602975" version="1" comment="libreoffice-l10n-sd is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602976" version="1" comment="libreoffice-l10n-si is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602977" version="1" comment="libreoffice-l10n-sid is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602978" version="1" comment="libreoffice-l10n-sk is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602979" version="1" comment="libreoffice-l10n-sl is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602980" version="1" comment="libreoffice-l10n-sq is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602981" version="1" comment="libreoffice-l10n-sr is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602982" version="1" comment="libreoffice-l10n-ss is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602983" version="1" comment="libreoffice-l10n-st is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602984" version="1" comment="libreoffice-l10n-sv is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602985" version="1" comment="libreoffice-l10n-sw_TZ is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602986" version="1" comment="libreoffice-l10n-ta is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602987" version="1" comment="libreoffice-l10n-te is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602988" version="1" comment="libreoffice-l10n-tg is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602989" version="1" comment="libreoffice-l10n-th is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602990" version="1" comment="libreoffice-l10n-tn is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602991" version="1" comment="libreoffice-l10n-tr is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602992" version="1" comment="libreoffice-l10n-ts is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602993" version="1" comment="libreoffice-l10n-tt is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602994" version="1" comment="libreoffice-l10n-ug is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602995" version="1" comment="libreoffice-l10n-uk is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602996" version="1" comment="libreoffice-l10n-uz is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602997" version="1" comment="libreoffice-l10n-ve is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602998" version="1" comment="libreoffice-l10n-vec is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009602999" version="1" comment="libreoffice-l10n-vi is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603000" version="1" comment="libreoffice-l10n-xh is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603001" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603002" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603003" version="1" comment="libreoffice-l10n-zu is &lt;6.2.7.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603004" version="1" comment="libreoffice-mailmerge is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603005" version="1" comment="libreoffice-math is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603006" version="1" comment="libreoffice-officebean is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603007" version="1" comment="libreoffice-pyuno is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603008" version="1" comment="libreoffice-qt5 is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603009" version="1" comment="libreoffice-sdk is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603010" version="1" comment="libreoffice-sdk-doc is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603011" version="1" comment="libreoffice-writer is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603012" version="1" comment="libreoffice-writer-extensions is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603013" version="1" comment="libreofficekit is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603014" version="1" comment="libreofficekit-devel is &lt;6.2.7.1-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604028" version="1" comment="cmis-client is &lt;0.5.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153300" version="1" comment="cmis-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604029" version="1" comment="libcmis-0_5-5 is &lt;0.5.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153309" version="1" comment="libcmis-0_5-5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604030" version="1" comment="libcmis-c-0_5-5 is &lt;0.5.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153310" version="1" comment="libcmis-c-0_5-5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604031" version="1" comment="libcmis-c-devel is &lt;0.5.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153311" version="1" comment="libcmis-c-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604032" version="1" comment="libcmis-devel is &lt;0.5.2-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153312" version="1" comment="libcmis-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604033" version="1" comment="libixion-0_15-0 is &lt;0.15.0-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275304" version="1" comment="libixion-0_15-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604034" version="1" comment="libixion-devel is &lt;0.15.0-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604035" version="1" comment="libixion-tools is &lt;0.15.0-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604036" version="1" comment="libmwaw-0_3-3 is &lt;0.3.15-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158753" version="1" comment="libmwaw-0_3-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604037" version="1" comment="libmwaw-devel is &lt;0.3.15-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158754" version="1" comment="libmwaw-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604038" version="1" comment="libmwaw-devel-doc is &lt;0.3.15-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158755" version="1" comment="libmwaw-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604039" version="1" comment="libmwaw-tools is &lt;0.3.15-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158756" version="1" comment="libmwaw-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604040" version="1" comment="liborcus-0_15-0 is &lt;0.15.3-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275305" version="1" comment="liborcus-0_15-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604041" version="1" comment="liborcus-devel is &lt;0.15.3-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604042" version="1" comment="liborcus-tools is &lt;0.15.3-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604043" version="1" comment="libreoffice is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604044" version="1" comment="libreoffice-base is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604045" version="1" comment="libreoffice-base-drivers-firebird is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604046" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604047" version="1" comment="libreoffice-branding-upstream is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604048" version="1" comment="libreoffice-calc is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604049" version="1" comment="libreoffice-calc-extensions is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604050" version="1" comment="libreoffice-draw is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604051" version="1" comment="libreoffice-filters-optional is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604052" version="1" comment="libreoffice-gdb-pretty-printers is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604053" version="1" comment="libreoffice-glade is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604054" version="1" comment="libreoffice-gnome is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604055" version="1" comment="libreoffice-gtk3 is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604056" version="1" comment="libreoffice-icon-themes is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604057" version="1" comment="libreoffice-impress is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604058" version="1" comment="libreoffice-l10n-af is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604059" version="1" comment="libreoffice-l10n-am is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604060" version="1" comment="libreoffice-l10n-ar is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604061" version="1" comment="libreoffice-l10n-as is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604062" version="1" comment="libreoffice-l10n-ast is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604063" version="1" comment="libreoffice-l10n-be is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604064" version="1" comment="libreoffice-l10n-bg is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604065" version="1" comment="libreoffice-l10n-bn is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604066" version="1" comment="libreoffice-l10n-bn_IN is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604067" version="1" comment="libreoffice-l10n-bo is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604068" version="1" comment="libreoffice-l10n-br is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604069" version="1" comment="libreoffice-l10n-brx is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604070" version="1" comment="libreoffice-l10n-bs is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604071" version="1" comment="libreoffice-l10n-ca is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604072" version="1" comment="libreoffice-l10n-ca_valencia is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604073" version="1" comment="libreoffice-l10n-cs is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604074" version="1" comment="libreoffice-l10n-cy is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604075" version="1" comment="libreoffice-l10n-da is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604076" version="1" comment="libreoffice-l10n-de is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604077" version="1" comment="libreoffice-l10n-dgo is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604078" version="1" comment="libreoffice-l10n-dsb is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604079" version="1" comment="libreoffice-l10n-dz is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604080" version="1" comment="libreoffice-l10n-el is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604081" version="1" comment="libreoffice-l10n-en is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604082" version="1" comment="libreoffice-l10n-en_GB is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604083" version="1" comment="libreoffice-l10n-en_ZA is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604084" version="1" comment="libreoffice-l10n-eo is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604085" version="1" comment="libreoffice-l10n-es is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604086" version="1" comment="libreoffice-l10n-et is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604087" version="1" comment="libreoffice-l10n-eu is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604088" version="1" comment="libreoffice-l10n-fa is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604089" version="1" comment="libreoffice-l10n-fi is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604090" version="1" comment="libreoffice-l10n-fr is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604091" version="1" comment="libreoffice-l10n-fy is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604092" version="1" comment="libreoffice-l10n-ga is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604093" version="1" comment="libreoffice-l10n-gd is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604094" version="1" comment="libreoffice-l10n-gl is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604095" version="1" comment="libreoffice-l10n-gu is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604096" version="1" comment="libreoffice-l10n-gug is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604097" version="1" comment="libreoffice-l10n-he is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604098" version="1" comment="libreoffice-l10n-hi is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604099" version="1" comment="libreoffice-l10n-hr is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604100" version="1" comment="libreoffice-l10n-hsb is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604101" version="1" comment="libreoffice-l10n-hu is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604102" version="1" comment="libreoffice-l10n-id is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604103" version="1" comment="libreoffice-l10n-is is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604104" version="1" comment="libreoffice-l10n-it is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604105" version="1" comment="libreoffice-l10n-ja is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604106" version="1" comment="libreoffice-l10n-ka is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604107" version="1" comment="libreoffice-l10n-kab is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604108" version="1" comment="libreoffice-l10n-kk is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604109" version="1" comment="libreoffice-l10n-km is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604110" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604111" version="1" comment="libreoffice-l10n-kn is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604112" version="1" comment="libreoffice-l10n-ko is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604113" version="1" comment="libreoffice-l10n-kok is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604114" version="1" comment="libreoffice-l10n-ks is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604115" version="1" comment="libreoffice-l10n-lb is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604116" version="1" comment="libreoffice-l10n-lo is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604117" version="1" comment="libreoffice-l10n-lt is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604118" version="1" comment="libreoffice-l10n-lv is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604119" version="1" comment="libreoffice-l10n-mai is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604120" version="1" comment="libreoffice-l10n-mk is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604121" version="1" comment="libreoffice-l10n-ml is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604122" version="1" comment="libreoffice-l10n-mn is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604123" version="1" comment="libreoffice-l10n-mni is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604124" version="1" comment="libreoffice-l10n-mr is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604125" version="1" comment="libreoffice-l10n-my is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604126" version="1" comment="libreoffice-l10n-nb is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604127" version="1" comment="libreoffice-l10n-ne is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604128" version="1" comment="libreoffice-l10n-nl is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604129" version="1" comment="libreoffice-l10n-nn is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604130" version="1" comment="libreoffice-l10n-nr is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604131" version="1" comment="libreoffice-l10n-nso is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604132" version="1" comment="libreoffice-l10n-oc is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604133" version="1" comment="libreoffice-l10n-om is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604134" version="1" comment="libreoffice-l10n-or is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604135" version="1" comment="libreoffice-l10n-pa is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604136" version="1" comment="libreoffice-l10n-pl is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604137" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604138" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604139" version="1" comment="libreoffice-l10n-ro is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604140" version="1" comment="libreoffice-l10n-ru is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604141" version="1" comment="libreoffice-l10n-rw is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604142" version="1" comment="libreoffice-l10n-sa_IN is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604143" version="1" comment="libreoffice-l10n-sat is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604144" version="1" comment="libreoffice-l10n-sd is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604145" version="1" comment="libreoffice-l10n-si is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604146" version="1" comment="libreoffice-l10n-sid is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604147" version="1" comment="libreoffice-l10n-sk is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604148" version="1" comment="libreoffice-l10n-sl is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604149" version="1" comment="libreoffice-l10n-sq is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604150" version="1" comment="libreoffice-l10n-sr is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604151" version="1" comment="libreoffice-l10n-ss is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604152" version="1" comment="libreoffice-l10n-st is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604153" version="1" comment="libreoffice-l10n-sv is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604154" version="1" comment="libreoffice-l10n-sw_TZ is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604155" version="1" comment="libreoffice-l10n-szl is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275306" version="1" comment="libreoffice-l10n-szl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604156" version="1" comment="libreoffice-l10n-ta is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604157" version="1" comment="libreoffice-l10n-te is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604158" version="1" comment="libreoffice-l10n-tg is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604159" version="1" comment="libreoffice-l10n-th is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604160" version="1" comment="libreoffice-l10n-tn is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604161" version="1" comment="libreoffice-l10n-tr is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604162" version="1" comment="libreoffice-l10n-ts is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604163" version="1" comment="libreoffice-l10n-tt is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604164" version="1" comment="libreoffice-l10n-ug is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604165" version="1" comment="libreoffice-l10n-uk is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604166" version="1" comment="libreoffice-l10n-uz is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604167" version="1" comment="libreoffice-l10n-ve is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604168" version="1" comment="libreoffice-l10n-vec is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604169" version="1" comment="libreoffice-l10n-vi is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604170" version="1" comment="libreoffice-l10n-xh is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604171" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604172" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604173" version="1" comment="libreoffice-l10n-zu is &lt;6.3.3.2-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604174" version="1" comment="libreoffice-librelogo is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275307" version="1" comment="libreoffice-librelogo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604175" version="1" comment="libreoffice-mailmerge is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604176" version="1" comment="libreoffice-math is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604177" version="1" comment="libreoffice-officebean is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604178" version="1" comment="libreoffice-pyuno is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604179" version="1" comment="libreoffice-qt5 is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604180" version="1" comment="libreoffice-sdk is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604181" version="1" comment="libreoffice-sdk-doc is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604182" version="1" comment="libreoffice-writer is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604183" version="1" comment="libreoffice-writer-extensions is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604184" version="1" comment="libreofficekit is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604185" version="1" comment="libreofficekit-devel is &lt;6.3.3.2-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604186" version="1" comment="mdds-1_5-devel is &lt;1.5.0-lp151.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275309" version="1" comment="mdds-1_5-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604187" version="1" comment="myspell-af_NA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604188" version="1" comment="myspell-af_ZA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604189" version="1" comment="myspell-an is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604190" version="1" comment="myspell-an_ES is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604191" version="1" comment="myspell-ar is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604192" version="1" comment="myspell-ar_AE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604193" version="1" comment="myspell-ar_BH is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604194" version="1" comment="myspell-ar_DZ is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604195" version="1" comment="myspell-ar_EG is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604196" version="1" comment="myspell-ar_IQ is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604197" version="1" comment="myspell-ar_JO is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604198" version="1" comment="myspell-ar_KW is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604199" version="1" comment="myspell-ar_LB is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604200" version="1" comment="myspell-ar_LY is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604201" version="1" comment="myspell-ar_MA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604202" version="1" comment="myspell-ar_OM is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604203" version="1" comment="myspell-ar_QA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604204" version="1" comment="myspell-ar_SA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604205" version="1" comment="myspell-ar_SD is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604206" version="1" comment="myspell-ar_SY is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604207" version="1" comment="myspell-ar_TN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604208" version="1" comment="myspell-ar_YE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604209" version="1" comment="myspell-be_BY is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604210" version="1" comment="myspell-bg_BG is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604211" version="1" comment="myspell-bn_BD is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604212" version="1" comment="myspell-bn_IN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604213" version="1" comment="myspell-bo is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604214" version="1" comment="myspell-bo_CN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604215" version="1" comment="myspell-bo_IN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604216" version="1" comment="myspell-br_FR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604217" version="1" comment="myspell-bs is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604218" version="1" comment="myspell-bs_BA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604219" version="1" comment="myspell-ca is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604220" version="1" comment="myspell-ca_AD is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604221" version="1" comment="myspell-ca_ES is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604222" version="1" comment="myspell-ca_ES_valencia is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604223" version="1" comment="myspell-ca_FR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604224" version="1" comment="myspell-ca_IT is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604225" version="1" comment="myspell-cs_CZ is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604226" version="1" comment="myspell-da_DK is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604227" version="1" comment="myspell-de is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604228" version="1" comment="myspell-de_AT is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604229" version="1" comment="myspell-de_CH is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604230" version="1" comment="myspell-de_DE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604231" version="1" comment="myspell-dictionaries is &lt;20191016-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604232" version="1" comment="myspell-el_GR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604233" version="1" comment="myspell-en is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604234" version="1" comment="myspell-en_AU is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604235" version="1" comment="myspell-en_BS is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604236" version="1" comment="myspell-en_BZ is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604237" version="1" comment="myspell-en_CA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604238" version="1" comment="myspell-en_GB is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604239" version="1" comment="myspell-en_GH is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604240" version="1" comment="myspell-en_IE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604241" version="1" comment="myspell-en_IN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604242" version="1" comment="myspell-en_JM is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604243" version="1" comment="myspell-en_MW is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604244" version="1" comment="myspell-en_NA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604245" version="1" comment="myspell-en_NZ is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604246" version="1" comment="myspell-en_PH is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604247" version="1" comment="myspell-en_TT is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604248" version="1" comment="myspell-en_US is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604249" version="1" comment="myspell-en_ZA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604250" version="1" comment="myspell-en_ZW is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604251" version="1" comment="myspell-es is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604252" version="1" comment="myspell-es_AR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604253" version="1" comment="myspell-es_BO is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604254" version="1" comment="myspell-es_CL is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604255" version="1" comment="myspell-es_CO is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604256" version="1" comment="myspell-es_CR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604257" version="1" comment="myspell-es_CU is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604258" version="1" comment="myspell-es_DO is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604259" version="1" comment="myspell-es_EC is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604260" version="1" comment="myspell-es_ES is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604261" version="1" comment="myspell-es_GT is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604262" version="1" comment="myspell-es_HN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604263" version="1" comment="myspell-es_MX is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604264" version="1" comment="myspell-es_NI is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604265" version="1" comment="myspell-es_PA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604266" version="1" comment="myspell-es_PE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604267" version="1" comment="myspell-es_PR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604268" version="1" comment="myspell-es_PY is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604269" version="1" comment="myspell-es_SV is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604270" version="1" comment="myspell-es_UY is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604271" version="1" comment="myspell-es_VE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604272" version="1" comment="myspell-et_EE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604273" version="1" comment="myspell-fr_BE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604274" version="1" comment="myspell-fr_CA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604275" version="1" comment="myspell-fr_CH is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604276" version="1" comment="myspell-fr_FR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604277" version="1" comment="myspell-fr_LU is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604278" version="1" comment="myspell-fr_MC is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604279" version="1" comment="myspell-gd_GB is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604280" version="1" comment="myspell-gl is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604281" version="1" comment="myspell-gl_ES is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604282" version="1" comment="myspell-gu_IN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604283" version="1" comment="myspell-gug is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604284" version="1" comment="myspell-gug_PY is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604285" version="1" comment="myspell-he_IL is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604286" version="1" comment="myspell-hi_IN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604287" version="1" comment="myspell-hr_HR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604288" version="1" comment="myspell-hu_HU is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604289" version="1" comment="myspell-id is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604290" version="1" comment="myspell-id_ID is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604291" version="1" comment="myspell-is is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604292" version="1" comment="myspell-is_IS is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604293" version="1" comment="myspell-it_IT is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604294" version="1" comment="myspell-kmr_Latn is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604295" version="1" comment="myspell-kmr_Latn_SY is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604296" version="1" comment="myspell-kmr_Latn_TR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604297" version="1" comment="myspell-lightproof-en is &lt;20191016-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604298" version="1" comment="myspell-lightproof-hu_HU is &lt;20191016-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604299" version="1" comment="myspell-lightproof-pt_BR is &lt;20191016-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604300" version="1" comment="myspell-lightproof-ru_RU is &lt;20191016-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604301" version="1" comment="myspell-lo_LA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604302" version="1" comment="myspell-lt_LT is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604303" version="1" comment="myspell-lv_LV is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604304" version="1" comment="myspell-nb_NO is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604305" version="1" comment="myspell-ne_NP is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604306" version="1" comment="myspell-nl_BE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604307" version="1" comment="myspell-nl_NL is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604308" version="1" comment="myspell-nn_NO is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604309" version="1" comment="myspell-no is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604310" version="1" comment="myspell-oc_FR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604311" version="1" comment="myspell-pl_PL is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604312" version="1" comment="myspell-pt_AO is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604313" version="1" comment="myspell-pt_BR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604314" version="1" comment="myspell-pt_PT is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604315" version="1" comment="myspell-ro is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604316" version="1" comment="myspell-ro_RO is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604317" version="1" comment="myspell-ru_RU is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604318" version="1" comment="myspell-si_LK is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604319" version="1" comment="myspell-sk_SK is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604320" version="1" comment="myspell-sl_SI is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604321" version="1" comment="myspell-sq_AL is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604322" version="1" comment="myspell-sr is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604323" version="1" comment="myspell-sr_CS is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604324" version="1" comment="myspell-sr_Latn_CS is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604325" version="1" comment="myspell-sr_Latn_RS is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604326" version="1" comment="myspell-sr_RS is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604327" version="1" comment="myspell-sv_FI is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604328" version="1" comment="myspell-sv_SE is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604329" version="1" comment="myspell-sw_TZ is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604330" version="1" comment="myspell-te is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604331" version="1" comment="myspell-te_IN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604332" version="1" comment="myspell-th_TH is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604333" version="1" comment="myspell-tr is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604334" version="1" comment="myspell-tr_TR is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604335" version="1" comment="myspell-uk_UA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604336" version="1" comment="myspell-vi is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604337" version="1" comment="myspell-vi_VN is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604338" version="1" comment="myspell-zu_ZA is &lt;20191016-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604339" version="1" comment="python3-libixion is &lt;0.15.0-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604340" version="1" comment="python3-liborcus is &lt;0.15.3-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604341" version="1" comment="spdlog-devel is &lt;0.16.3-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009275311" version="1" comment="spdlog-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603247" version="1" comment="libseccomp-devel is &lt;2.4.1-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267594" version="1" comment="libseccomp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603248" version="1" comment="libseccomp-tools is &lt;2.4.1-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267595" version="1" comment="libseccomp-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603249" version="1" comment="libseccomp2 is &lt;2.4.1-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267596" version="1" comment="libseccomp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009603250" version="1" comment="libseccomp2-32bit is &lt;2.4.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009267597" version="1" comment="libseccomp2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607985" version="1" comment="gstreamer-plugins-base is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153927" version="1" comment="gstreamer-plugins-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607986" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153928" version="1" comment="gstreamer-plugins-base-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607987" version="1" comment="gstreamer-plugins-base-devel is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153929" version="1" comment="gstreamer-plugins-base-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607988" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154283" version="1" comment="gstreamer-plugins-base-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607989" version="1" comment="gstreamer-plugins-base-doc is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153930" version="1" comment="gstreamer-plugins-base-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607990" version="1" comment="gstreamer-plugins-base-lang is &lt;1.12.5-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153931" version="1" comment="gstreamer-plugins-base-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607991" version="1" comment="libgstallocators-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153932" version="1" comment="libgstallocators-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607992" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153933" version="1" comment="libgstallocators-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607993" version="1" comment="libgstapp-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153936" version="1" comment="libgstapp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607994" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153937" version="1" comment="libgstapp-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607995" version="1" comment="libgstaudio-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153938" version="1" comment="libgstaudio-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607996" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153939" version="1" comment="libgstaudio-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607997" version="1" comment="libgstfft-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153940" version="1" comment="libgstfft-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607998" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153941" version="1" comment="libgstfft-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607999" version="1" comment="libgstpbutils-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153944" version="1" comment="libgstpbutils-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608000" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153945" version="1" comment="libgstpbutils-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608001" version="1" comment="libgstriff-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153946" version="1" comment="libgstriff-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608002" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153947" version="1" comment="libgstriff-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608003" version="1" comment="libgstrtp-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153948" version="1" comment="libgstrtp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608004" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153949" version="1" comment="libgstrtp-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608005" version="1" comment="libgstrtsp-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153950" version="1" comment="libgstrtsp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608006" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153951" version="1" comment="libgstrtsp-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608007" version="1" comment="libgstsdp-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153952" version="1" comment="libgstsdp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608008" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153953" version="1" comment="libgstsdp-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608009" version="1" comment="libgsttag-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153954" version="1" comment="libgsttag-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608010" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153955" version="1" comment="libgsttag-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608011" version="1" comment="libgstvideo-1_0-0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153956" version="1" comment="libgstvideo-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608012" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.12.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153957" version="1" comment="libgstvideo-1_0-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608013" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153958" version="1" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608014" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153960" version="1" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608015" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153961" version="1" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608016" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153962" version="1" comment="typelib-1_0-GstFft-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608017" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153964" version="1" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608018" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153966" version="1" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608019" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153967" version="1" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608020" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153968" version="1" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608021" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153969" version="1" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608022" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.12.5-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153970" version="1" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608029" version="1" comment="libvpx-devel is &lt;1.6.1-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608030" version="1" comment="libvpx4 is &lt;1.6.1-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608031" version="1" comment="libvpx4-32bit is &lt;1.6.1-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608032" version="1" comment="vpx-tools is &lt;1.6.1-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605510" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605511" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605512" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605513" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605514" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605515" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605516" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.71.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605517" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.71.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605518" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.71.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605519" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605520" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605521" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605522" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.71.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605523" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605524" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605525" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.71.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605526" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.71.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605527" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605528" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605529" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605530" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.71.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606106" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606107" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606108" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606109" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606110" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606111" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606112" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606113" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.79.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606114" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.79.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606115" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606116" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606117" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606118" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606119" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606120" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606121" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606122" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606123" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606124" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606125" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606126" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606908" version="1" comment="flac is &lt;1.3.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152521" version="1" comment="flac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606909" version="1" comment="flac-devel is &lt;1.3.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152522" version="1" comment="flac-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606910" version="1" comment="flac-devel-32bit is &lt;1.3.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175207" version="1" comment="flac-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606911" version="1" comment="flac-doc is &lt;1.3.2-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175208" version="1" comment="flac-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606912" version="1" comment="libFLAC++6 is &lt;1.3.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152523" version="1" comment="libFLAC++6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606913" version="1" comment="libFLAC++6-32bit is &lt;1.3.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009175209" version="1" comment="libFLAC++6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606914" version="1" comment="libFLAC8 is &lt;1.3.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152524" version="1" comment="libFLAC8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606915" version="1" comment="libFLAC8-32bit is &lt;1.3.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152525" version="1" comment="libFLAC8-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608453" version="1" comment="ucode-intel is &lt;20200602-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609233" version="1" comment="xen is &lt;4.12.3_04-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609234" version="1" comment="xen-devel is &lt;4.12.3_04-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609235" version="1" comment="xen-doc-html is &lt;4.12.3_04-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609236" version="1" comment="xen-libs is &lt;4.12.3_04-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609237" version="1" comment="xen-libs-32bit is &lt;4.12.3_04-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609238" version="1" comment="xen-tools is &lt;4.12.3_04-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609239" version="1" comment="xen-tools-domU is &lt;4.12.3_04-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607412" version="1" comment="bluez is &lt;5.48-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607413" version="1" comment="bluez-auto-enable-devices is &lt;5.48-lp151.8.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607414" version="1" comment="bluez-cups is &lt;5.48-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607415" version="1" comment="bluez-devel is &lt;5.48-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607416" version="1" comment="bluez-devel-32bit is &lt;5.48-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607417" version="1" comment="bluez-test is &lt;5.48-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607418" version="1" comment="libbluetooth3 is &lt;5.48-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607419" version="1" comment="libbluetooth3-32bit is &lt;5.48-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609823" version="1" comment="chromedriver is &lt;81.0.4044.129-lp151.2.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609824" version="1" comment="chromium is &lt;81.0.4044.129-lp151.2.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606422" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152268" version="1" comment="libQt5Bootstrap-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606423" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152269" version="1" comment="libQt5Bootstrap-devel-static-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606424" version="1" comment="libQt5Concurrent-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152274" version="1" comment="libQt5Concurrent-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606425" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152275" version="1" comment="libQt5Concurrent-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606426" version="1" comment="libQt5Concurrent5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152276" version="1" comment="libQt5Concurrent5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606427" version="1" comment="libQt5Concurrent5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152277" version="1" comment="libQt5Concurrent5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606428" version="1" comment="libQt5Core-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152278" version="1" comment="libQt5Core-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606429" version="1" comment="libQt5Core-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152279" version="1" comment="libQt5Core-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606430" version="1" comment="libQt5Core-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152280" version="1" comment="libQt5Core-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606431" version="1" comment="libQt5Core5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152281" version="1" comment="libQt5Core5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606432" version="1" comment="libQt5Core5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152282" version="1" comment="libQt5Core5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606433" version="1" comment="libQt5DBus-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152283" version="1" comment="libQt5DBus-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606434" version="1" comment="libQt5DBus-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152284" version="1" comment="libQt5DBus-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606435" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152285" version="1" comment="libQt5DBus-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606436" version="1" comment="libQt5DBus5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152286" version="1" comment="libQt5DBus5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606437" version="1" comment="libQt5DBus5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152287" version="1" comment="libQt5DBus5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606438" version="1" comment="libQt5Gui-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152294" version="1" comment="libQt5Gui-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606439" version="1" comment="libQt5Gui-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152295" version="1" comment="libQt5Gui-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606440" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152296" version="1" comment="libQt5Gui-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606441" version="1" comment="libQt5Gui5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152297" version="1" comment="libQt5Gui5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606442" version="1" comment="libQt5Gui5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152298" version="1" comment="libQt5Gui5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606443" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245302" version="1" comment="libQt5KmsSupport-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606444" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245303" version="1" comment="libQt5KmsSupport-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606445" version="1" comment="libQt5Network-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152305" version="1" comment="libQt5Network-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606446" version="1" comment="libQt5Network-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152306" version="1" comment="libQt5Network-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606447" version="1" comment="libQt5Network-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152307" version="1" comment="libQt5Network-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606448" version="1" comment="libQt5Network5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152308" version="1" comment="libQt5Network5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606449" version="1" comment="libQt5Network5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152309" version="1" comment="libQt5Network5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606450" version="1" comment="libQt5OpenGL-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152313" version="1" comment="libQt5OpenGL-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606451" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152314" version="1" comment="libQt5OpenGL-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606452" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152315" version="1" comment="libQt5OpenGL-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606453" version="1" comment="libQt5OpenGL5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152316" version="1" comment="libQt5OpenGL5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606454" version="1" comment="libQt5OpenGL5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152317" version="1" comment="libQt5OpenGL5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606455" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152318" version="1" comment="libQt5OpenGLExtensions-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606456" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152319" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606457" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152320" version="1" comment="libQt5PlatformHeaders-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606458" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152321" version="1" comment="libQt5PlatformSupport-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606459" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152322" version="1" comment="libQt5PlatformSupport-devel-static-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606460" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152323" version="1" comment="libQt5PlatformSupport-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606461" version="1" comment="libQt5PrintSupport-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152326" version="1" comment="libQt5PrintSupport-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606462" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152327" version="1" comment="libQt5PrintSupport-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606463" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152328" version="1" comment="libQt5PrintSupport-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606464" version="1" comment="libQt5PrintSupport5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152329" version="1" comment="libQt5PrintSupport5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606465" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152330" version="1" comment="libQt5PrintSupport5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606466" version="1" comment="libQt5Sql-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152338" version="1" comment="libQt5Sql-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606467" version="1" comment="libQt5Sql-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152339" version="1" comment="libQt5Sql-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606468" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152340" version="1" comment="libQt5Sql-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606469" version="1" comment="libQt5Sql5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152341" version="1" comment="libQt5Sql5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606470" version="1" comment="libQt5Sql5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152342" version="1" comment="libQt5Sql5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606471" version="1" comment="libQt5Sql5-mysql is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152343" version="1" comment="libQt5Sql5-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606472" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152344" version="1" comment="libQt5Sql5-mysql-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606473" version="1" comment="libQt5Sql5-postgresql is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152345" version="1" comment="libQt5Sql5-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606474" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152346" version="1" comment="libQt5Sql5-postgresql-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606475" version="1" comment="libQt5Sql5-sqlite is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152347" version="1" comment="libQt5Sql5-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606476" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152348" version="1" comment="libQt5Sql5-sqlite-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606477" version="1" comment="libQt5Sql5-unixODBC is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152349" version="1" comment="libQt5Sql5-unixODBC is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606478" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152350" version="1" comment="libQt5Sql5-unixODBC-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606479" version="1" comment="libQt5Test-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152353" version="1" comment="libQt5Test-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606480" version="1" comment="libQt5Test-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152354" version="1" comment="libQt5Test-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606481" version="1" comment="libQt5Test-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152355" version="1" comment="libQt5Test-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606482" version="1" comment="libQt5Test5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152356" version="1" comment="libQt5Test5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606483" version="1" comment="libQt5Test5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152357" version="1" comment="libQt5Test5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606484" version="1" comment="libQt5Widgets-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152377" version="1" comment="libQt5Widgets-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606485" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152378" version="1" comment="libQt5Widgets-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606486" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152379" version="1" comment="libQt5Widgets-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606487" version="1" comment="libQt5Widgets5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152380" version="1" comment="libQt5Widgets5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606488" version="1" comment="libQt5Widgets5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152381" version="1" comment="libQt5Widgets5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606489" version="1" comment="libQt5Xml-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152384" version="1" comment="libQt5Xml-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606490" version="1" comment="libQt5Xml-devel-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152385" version="1" comment="libQt5Xml-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606491" version="1" comment="libQt5Xml5 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152386" version="1" comment="libQt5Xml5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606492" version="1" comment="libQt5Xml5-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152387" version="1" comment="libQt5Xml5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606493" version="1" comment="libqt5-qtbase-common-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152401" version="1" comment="libqt5-qtbase-common-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606494" version="1" comment="libqt5-qtbase-devel is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152402" version="1" comment="libqt5-qtbase-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606495" version="1" comment="libqt5-qtbase-examples is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152404" version="1" comment="libqt5-qtbase-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606496" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.9.7-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152405" version="1" comment="libqt5-qtbase-examples-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606497" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.9.7-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177209" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606498" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.9.7-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152407" version="1" comment="libqt5-qtbase-private-headers-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607811" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-lp151.2.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607812" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.28.1-lp151.2.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607813" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-lp151.2.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607814" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.28.1-lp151.2.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607815" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.1-lp151.2.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607816" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-lp151.2.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607817" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-lp151.2.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607818" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.1-lp151.2.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607819" version="1" comment="webkit-jsc-4 is &lt;2.28.1-lp151.2.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607820" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-lp151.2.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607821" version="1" comment="webkit2gtk3-devel is &lt;2.28.1-lp151.2.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607822" version="1" comment="webkit2gtk3-minibrowser is &lt;2.28.1-lp151.2.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607252" version="1" comment="glibc is &lt;2.26-lp151.19.3.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151368" version="1" comment="glibc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607253" version="1" comment="glibc-32bit is &lt;2.26-lp151.19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151369" version="1" comment="glibc-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607254" version="1" comment="glibc-devel is &lt;2.26-lp151.19.3.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151370" version="1" comment="glibc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607255" version="1" comment="glibc-devel-32bit is &lt;2.26-lp151.19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152566" version="1" comment="glibc-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607256" version="1" comment="glibc-devel-static is &lt;2.26-lp151.19.3.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152567" version="1" comment="glibc-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607257" version="1" comment="glibc-devel-static-32bit is &lt;2.26-lp151.19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152568" version="1" comment="glibc-devel-static-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607258" version="1" comment="glibc-extra is &lt;2.26-lp151.19.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151371" version="1" comment="glibc-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607259" version="1" comment="glibc-html is &lt;2.26-lp151.19.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152569" version="1" comment="glibc-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607260" version="1" comment="glibc-i18ndata is &lt;2.26-lp151.19.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152570" version="1" comment="glibc-i18ndata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607261" version="1" comment="glibc-info is &lt;2.26-lp151.19.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151372" version="1" comment="glibc-info is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607262" version="1" comment="glibc-locale is &lt;2.26-lp151.19.3.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151373" version="1" comment="glibc-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607263" version="1" comment="glibc-locale-base is &lt;2.26-lp151.19.3.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251612" version="1" comment="glibc-locale-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607264" version="1" comment="glibc-locale-base-32bit is &lt;2.26-lp151.19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251613" version="1" comment="glibc-locale-base-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607265" version="1" comment="glibc-profile is &lt;2.26-lp151.19.3.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152572" version="1" comment="glibc-profile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607266" version="1" comment="glibc-profile-32bit is &lt;2.26-lp151.19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152573" version="1" comment="glibc-profile-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607267" version="1" comment="glibc-utils is &lt;2.26-lp151.19.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152575" version="1" comment="glibc-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607268" version="1" comment="glibc-utils-32bit is &lt;2.26-lp151.19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152576" version="1" comment="glibc-utils-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607269" version="1" comment="nscd is &lt;2.26-lp151.19.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151375" version="1" comment="nscd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609825" version="1" comment="pdns-recursor is &lt;4.1.12-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153799" version="1" comment="pdns-recursor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607350" version="1" comment="icu is &lt;60.2-lp151.3.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163213" version="1" comment="icu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607351" version="1" comment="libicu-devel is &lt;60.2-lp151.3.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152556" version="1" comment="libicu-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607352" version="1" comment="libicu-devel-32bit is &lt;60.2-lp151.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163218" version="1" comment="libicu-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607353" version="1" comment="libicu-doc is &lt;60.2-lp151.3.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009163220" version="1" comment="libicu-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607354" version="1" comment="libicu60_2 is &lt;60.2-lp151.3.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281166" version="1" comment="libicu60_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607355" version="1" comment="libicu60_2-32bit is &lt;60.2-lp151.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281167" version="1" comment="libicu60_2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607356" version="1" comment="libicu60_2-bedata is &lt;60.2-lp151.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281168" version="1" comment="libicu60_2-bedata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607357" version="1" comment="libicu60_2-ledata is &lt;60.2-lp151.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281169" version="1" comment="libicu60_2-ledata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609004" version="1" comment="perl is &lt;5.26.1-lp151.9.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151455" version="1" comment="perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609005" version="1" comment="perl-32bit is &lt;5.26.1-lp151.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151456" version="1" comment="perl-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609006" version="1" comment="perl-base is &lt;5.26.1-lp151.9.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151457" version="1" comment="perl-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609007" version="1" comment="perl-base-32bit is &lt;5.26.1-lp151.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153231" version="1" comment="perl-base-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609008" version="1" comment="perl-doc is &lt;5.26.1-lp151.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151458" version="1" comment="perl-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609826" version="1" comment="tor is &lt;0.3.5.12-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153574" version="1" comment="tor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607673" version="1" comment="libruby2_5-2_5 is &lt;2.5.8-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607674" version="1" comment="ruby2.5 is &lt;2.5.8-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607675" version="1" comment="ruby2.5-devel is &lt;2.5.8-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607676" version="1" comment="ruby2.5-devel-extra is &lt;2.5.8-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607677" version="1" comment="ruby2.5-doc is &lt;2.5.8-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607678" version="1" comment="ruby2.5-doc-ri is &lt;2.5.8-lp151.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607679" version="1" comment="ruby2.5-stdlib is &lt;2.5.8-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608170" version="1" comment="dom4j is &lt;1.6.1-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235633" version="1" comment="dom4j is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608171" version="1" comment="dom4j-demo is &lt;1.6.1-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235634" version="1" comment="dom4j-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608172" version="1" comment="dom4j-javadoc is &lt;1.6.1-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235635" version="1" comment="dom4j-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608173" version="1" comment="dom4j-manual is &lt;1.6.1-lp151.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235636" version="1" comment="dom4j-manual is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607724" version="1" comment="ctdb is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607725" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607726" version="1" comment="ctdb-tests is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607727" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607728" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607729" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607730" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607731" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607732" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607733" version="1" comment="libdcerpc0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607734" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607735" version="1" comment="libndr-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607736" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607737" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607738" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607739" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607740" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607741" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607742" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607743" version="1" comment="libndr-standard0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607744" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607745" version="1" comment="libndr0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607746" version="1" comment="libndr0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607747" version="1" comment="libnetapi-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607748" version="1" comment="libnetapi0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607749" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607750" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607751" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607752" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607753" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607754" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607755" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607756" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607757" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607758" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607759" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607760" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607761" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607762" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607763" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607764" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607765" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607766" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607767" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607768" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607769" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607770" version="1" comment="libsamba-util0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607771" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607772" version="1" comment="libsamdb-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607773" version="1" comment="libsamdb0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607774" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607775" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607776" version="1" comment="libsmbclient0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607777" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607778" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607779" version="1" comment="libsmbconf0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607780" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607781" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607782" version="1" comment="libsmbldap2 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607783" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607784" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607785" version="1" comment="libtevent-util0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607786" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607787" version="1" comment="libwbclient-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607788" version="1" comment="libwbclient0 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607789" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607790" version="1" comment="samba is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607791" version="1" comment="samba-ad-dc is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607792" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607793" version="1" comment="samba-ceph is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607794" version="1" comment="samba-client is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607795" version="1" comment="samba-client-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607796" version="1" comment="samba-core-devel is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607797" version="1" comment="samba-doc is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607798" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607799" version="1" comment="samba-libs is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607800" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607801" version="1" comment="samba-libs-python is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607802" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607803" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607804" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607805" version="1" comment="samba-pidl is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607806" version="1" comment="samba-python is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607807" version="1" comment="samba-python3 is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607808" version="1" comment="samba-test is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607809" version="1" comment="samba-winbind is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607810" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.317.6d82fb3918b-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604572" version="1" comment="grub2 is &lt;2.02-lp151.21.21.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153175" version="1" comment="grub2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604573" version="1" comment="grub2-branding-upstream is &lt;2.02-lp151.21.21.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153176" version="1" comment="grub2-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604574" version="1" comment="grub2-i386-efi is &lt;2.02-lp151.21.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153177" version="1" comment="grub2-i386-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604575" version="1" comment="grub2-i386-pc is &lt;2.02-lp151.21.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153178" version="1" comment="grub2-i386-pc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604576" version="1" comment="grub2-i386-xen is &lt;2.02-lp151.21.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289024" version="1" comment="grub2-i386-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604577" version="1" comment="grub2-snapper-plugin is &lt;2.02-lp151.21.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153179" version="1" comment="grub2-snapper-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604578" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-lp151.21.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154139" version="1" comment="grub2-systemd-sleep-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604579" version="1" comment="grub2-x86_64-efi is &lt;2.02-lp151.21.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153180" version="1" comment="grub2-x86_64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604580" version="1" comment="grub2-x86_64-xen is &lt;2.02-lp151.21.21.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153181" version="1" comment="grub2-x86_64-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608051" version="1" comment="dpdk is &lt;18.11.3-lp151.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173355" version="1" comment="dpdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608052" version="1" comment="dpdk-devel is &lt;18.11.3-lp151.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173356" version="1" comment="dpdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608053" version="1" comment="dpdk-doc is &lt;18.11.3-lp151.3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173357" version="1" comment="dpdk-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608054" version="1" comment="dpdk-examples is &lt;18.11.3-lp151.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173358" version="1" comment="dpdk-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608055" version="1" comment="dpdk-kmp-default is &lt;18.11.3_k4.12.14_lp151.28.48-lp151.3.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173359" version="1" comment="dpdk-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608056" version="1" comment="dpdk-tools is &lt;18.11.3-lp151.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173360" version="1" comment="dpdk-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608057" version="1" comment="libdpdk-18_11 is &lt;18.11.3-lp151.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283682" version="1" comment="libdpdk-18_11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609250" version="1" comment="ctdb is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609251" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609252" version="1" comment="ctdb-tests is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604458" version="1" comment="ldb-tools is &lt;1.4.6-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152723" version="1" comment="ldb-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609253" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609254" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609255" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609256" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609257" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609258" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609259" version="1" comment="libdcerpc0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609260" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604459" version="1" comment="libldb-devel is &lt;1.4.6-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152732" version="1" comment="libldb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604460" version="1" comment="libldb1 is &lt;1.4.6-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152733" version="1" comment="libldb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604461" version="1" comment="libldb1-32bit is &lt;1.4.6-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152734" version="1" comment="libldb1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609261" version="1" comment="libndr-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609262" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609263" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609264" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609265" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609266" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609267" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609268" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609269" version="1" comment="libndr-standard0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609270" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609271" version="1" comment="libndr0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609272" version="1" comment="libndr0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609273" version="1" comment="libnetapi-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609274" version="1" comment="libnetapi-devel-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287505" version="1" comment="libnetapi-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609275" version="1" comment="libnetapi0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609276" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609277" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609278" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609279" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609280" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609281" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609282" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609283" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609284" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609285" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609286" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609287" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609288" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609289" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609290" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609291" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609292" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609293" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609294" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609295" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609296" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609297" version="1" comment="libsamba-util0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609298" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609299" version="1" comment="libsamdb-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609300" version="1" comment="libsamdb0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609301" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609302" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609303" version="1" comment="libsmbclient0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609304" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609305" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609306" version="1" comment="libsmbconf0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609307" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609308" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609309" version="1" comment="libsmbldap2 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609310" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609311" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609312" version="1" comment="libtevent-util0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609313" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609314" version="1" comment="libwbclient-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609315" version="1" comment="libwbclient0 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609316" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604462" version="1" comment="python-ldb is &lt;1.4.6-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177214" version="1" comment="python-ldb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604463" version="1" comment="python-ldb-32bit is &lt;1.4.6-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247518" version="1" comment="python-ldb-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604464" version="1" comment="python-ldb-devel is &lt;1.4.6-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247519" version="1" comment="python-ldb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604465" version="1" comment="python3-ldb is &lt;1.4.6-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247520" version="1" comment="python3-ldb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604466" version="1" comment="python3-ldb-32bit is &lt;1.4.6-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247521" version="1" comment="python3-ldb-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604467" version="1" comment="python3-ldb-devel is &lt;1.4.6-lp151.2.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247522" version="1" comment="python3-ldb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609317" version="1" comment="samba is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609318" version="1" comment="samba-ad-dc is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609319" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609320" version="1" comment="samba-ceph is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609321" version="1" comment="samba-client is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609322" version="1" comment="samba-client-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609323" version="1" comment="samba-core-devel is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609324" version="1" comment="samba-doc is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609325" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609326" version="1" comment="samba-libs is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609327" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609328" version="1" comment="samba-libs-python is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609329" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609330" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609331" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609332" version="1" comment="samba-pidl is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609333" version="1" comment="samba-python is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609334" version="1" comment="samba-python3 is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609335" version="1" comment="samba-test is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609336" version="1" comment="samba-winbind is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609337" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.343.4bc358522a9-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604373" version="1" comment="cni-plugins is &lt;0.8.6-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609074" version="1" comment="ceph is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154227" version="1" comment="ceph is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609075" version="1" comment="ceph-base is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154228" version="1" comment="ceph-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609076" version="1" comment="ceph-common is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154229" version="1" comment="ceph-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609077" version="1" comment="ceph-dashboard-e2e is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278214" version="1" comment="ceph-dashboard-e2e is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609078" version="1" comment="ceph-fuse is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154230" version="1" comment="ceph-fuse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609079" version="1" comment="ceph-grafana-dashboards is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278215" version="1" comment="ceph-grafana-dashboards is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609080" version="1" comment="ceph-mds is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154231" version="1" comment="ceph-mds is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609081" version="1" comment="ceph-mgr is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177893" version="1" comment="ceph-mgr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609082" version="1" comment="ceph-mgr-dashboard is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278216" version="1" comment="ceph-mgr-dashboard is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609083" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278217" version="1" comment="ceph-mgr-diskprediction-cloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609084" version="1" comment="ceph-mgr-diskprediction-local is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278218" version="1" comment="ceph-mgr-diskprediction-local is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609085" version="1" comment="ceph-mgr-k8sevents is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278219" version="1" comment="ceph-mgr-k8sevents is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609086" version="1" comment="ceph-mgr-rook is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278220" version="1" comment="ceph-mgr-rook is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609087" version="1" comment="ceph-mgr-ssh is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278221" version="1" comment="ceph-mgr-ssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609088" version="1" comment="ceph-mon is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154232" version="1" comment="ceph-mon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609089" version="1" comment="ceph-osd is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154233" version="1" comment="ceph-osd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609090" version="1" comment="ceph-prometheus-alerts is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278222" version="1" comment="ceph-prometheus-alerts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609091" version="1" comment="ceph-radosgw is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154234" version="1" comment="ceph-radosgw is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609092" version="1" comment="ceph-resource-agents is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154235" version="1" comment="ceph-resource-agents is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609093" version="1" comment="ceph-test is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154236" version="1" comment="ceph-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609094" version="1" comment="cephfs-shell is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278223" version="1" comment="cephfs-shell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609095" version="1" comment="libcephfs-devel is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154237" version="1" comment="libcephfs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609096" version="1" comment="libcephfs2 is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177894" version="1" comment="libcephfs2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609097" version="1" comment="librados-devel is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154239" version="1" comment="librados-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609098" version="1" comment="librados2 is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154240" version="1" comment="librados2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609099" version="1" comment="libradospp-devel is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009278224" version="1" comment="libradospp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609100" version="1" comment="libradosstriper-devel is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154241" version="1" comment="libradosstriper-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609101" version="1" comment="libradosstriper1 is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154242" version="1" comment="libradosstriper1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609102" version="1" comment="librbd-devel is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154243" version="1" comment="librbd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609103" version="1" comment="librbd1 is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154244" version="1" comment="librbd1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609104" version="1" comment="librgw-devel is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154245" version="1" comment="librgw-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609105" version="1" comment="librgw2 is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154246" version="1" comment="librgw2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609106" version="1" comment="python3-ceph-argparse is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177896" version="1" comment="python3-ceph-argparse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609107" version="1" comment="python3-cephfs is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177897" version="1" comment="python3-cephfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609108" version="1" comment="python3-rados is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177898" version="1" comment="python3-rados is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609109" version="1" comment="python3-rbd is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177899" version="1" comment="python3-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609110" version="1" comment="python3-rgw is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177900" version="1" comment="python3-rgw is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609111" version="1" comment="rados-objclass-devel is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177901" version="1" comment="rados-objclass-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609112" version="1" comment="rbd-fuse is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154251" version="1" comment="rbd-fuse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609113" version="1" comment="rbd-mirror is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154252" version="1" comment="rbd-mirror is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609114" version="1" comment="rbd-nbd is &lt;14.2.9.970+ged84cae0c9-lp151.2.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154253" version="1" comment="rbd-nbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609338" version="1" comment="slirp4netns is &lt;0.4.7-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608974" version="1" comment="dfu-tool is &lt;1.0.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286264" version="1" comment="dfu-tool is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608975" version="1" comment="fwupd is &lt;1.0.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286265" version="1" comment="fwupd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608976" version="1" comment="fwupd-devel is &lt;1.0.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286266" version="1" comment="fwupd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608977" version="1" comment="fwupd-lang is &lt;1.0.9-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286267" version="1" comment="fwupd-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608978" version="1" comment="libfwupd2 is &lt;1.0.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286268" version="1" comment="libfwupd2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608979" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;1.0.9-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286269" version="1" comment="typelib-1_0-Fwupd-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609827" version="1" comment="phpMyAdmin is &lt;4.9.7-lp151.2.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608174" version="1" comment="dovecot23 is &lt;2.3.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608175" version="1" comment="dovecot23-backend-mysql is &lt;2.3.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608176" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608177" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608178" version="1" comment="dovecot23-devel is &lt;2.3.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608179" version="1" comment="dovecot23-fts is &lt;2.3.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608180" version="1" comment="dovecot23-fts-lucene is &lt;2.3.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608181" version="1" comment="dovecot23-fts-solr is &lt;2.3.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608182" version="1" comment="dovecot23-fts-squat is &lt;2.3.10-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604427" version="1" comment="freerdp is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604428" version="1" comment="freerdp-devel is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604429" version="1" comment="freerdp-proxy is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287971" version="1" comment="freerdp-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604430" version="1" comment="freerdp-server is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604431" version="1" comment="freerdp-wayland is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604432" version="1" comment="libfreerdp2 is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604433" version="1" comment="libuwac0-0 is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604434" version="1" comment="libwinpr2 is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604435" version="1" comment="uwac0-0-devel is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604436" version="1" comment="winpr2-devel is &lt;2.1.2-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609828" version="1" comment="cacti is &lt;1.2.13-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609829" version="1" comment="cacti-spine is &lt;1.2.13-lp151.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609830" version="1" comment="otrs is &lt;6.0.30-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609831" version="1" comment="otrs-doc is &lt;6.0.30-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609832" version="1" comment="otrs-itsm is &lt;6.0.30-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609343" version="1" comment="ruby2.5-rubygem-puma is &lt;4.3.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287506" version="1" comment="ruby2.5-rubygem-puma is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609344" version="1" comment="ruby2.5-rubygem-puma-doc is &lt;4.3.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287507" version="1" comment="ruby2.5-rubygem-puma-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608569" version="1" comment="nodejs8 is &lt;8.17.0-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608570" version="1" comment="nodejs8-devel is &lt;8.17.0-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608571" version="1" comment="nodejs8-docs is &lt;8.17.0-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608572" version="1" comment="npm8 is &lt;8.17.0-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607337" version="1" comment="haproxy is &lt;2.0.10+git0.ac198b92-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607483" version="1" comment="gmp-devel is &lt;6.1.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281482" version="1" comment="gmp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607484" version="1" comment="gmp-devel-32bit is &lt;6.1.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281483" version="1" comment="gmp-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607485" version="1" comment="gnutls is &lt;3.6.7-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607486" version="1" comment="gnutls-guile is &lt;3.6.7-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607487" version="1" comment="libgmp10 is &lt;6.1.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281484" version="1" comment="libgmp10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607488" version="1" comment="libgmp10-32bit is &lt;6.1.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281485" version="1" comment="libgmp10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607489" version="1" comment="libgmpxx4 is &lt;6.1.2-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281486" version="1" comment="libgmpxx4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607490" version="1" comment="libgmpxx4-32bit is &lt;6.1.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281487" version="1" comment="libgmpxx4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607491" version="1" comment="libgnutls-dane-devel is &lt;3.6.7-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607492" version="1" comment="libgnutls-dane0 is &lt;3.6.7-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607493" version="1" comment="libgnutls-devel is &lt;3.6.7-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607494" version="1" comment="libgnutls-devel-32bit is &lt;3.6.7-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607495" version="1" comment="libgnutls30 is &lt;3.6.7-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607496" version="1" comment="libgnutls30-32bit is &lt;3.6.7-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607497" version="1" comment="libgnutls30-hmac is &lt;3.6.7-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281488" version="1" comment="libgnutls30-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607498" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281489" version="1" comment="libgnutls30-hmac-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607499" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607500" version="1" comment="libgnutlsxx28 is &lt;3.6.7-lp151.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607501" version="1" comment="libhogweed4 is &lt;3.4.1-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177221" version="1" comment="libhogweed4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607502" version="1" comment="libhogweed4-32bit is &lt;3.4.1-lp151.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242425" version="1" comment="libhogweed4-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607503" version="1" comment="libnettle-devel is &lt;3.4.1-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153225" version="1" comment="libnettle-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607504" version="1" comment="libnettle-devel-32bit is &lt;3.4.1-lp151.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153226" version="1" comment="libnettle-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607505" version="1" comment="libnettle6 is &lt;3.4.1-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177222" version="1" comment="libnettle6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607506" version="1" comment="libnettle6-32bit is &lt;3.4.1-lp151.2.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242426" version="1" comment="libnettle6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607507" version="1" comment="nettle is &lt;3.4.1-lp151.2.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153229" version="1" comment="nettle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604597" version="1" comment="libwireshark13 is &lt;3.2.5-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604598" version="1" comment="libwiretap10 is &lt;3.2.5-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604599" version="1" comment="libwsutil11 is &lt;3.2.5-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604600" version="1" comment="wireshark is &lt;3.2.5-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604601" version="1" comment="wireshark-devel is &lt;3.2.5-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604602" version="1" comment="wireshark-ui-qt is &lt;3.2.5-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609833" version="1" comment="crawl is &lt;0.24.0-lp151.3.3.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281911" version="1" comment="crawl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609834" version="1" comment="crawl-data is &lt;0.24.0-lp151.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281912" version="1" comment="crawl-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609835" version="1" comment="crawl-sdl is &lt;0.24.0-lp151.3.3.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281913" version="1" comment="crawl-sdl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607706" version="1" comment="xen is &lt;4.12.2_04-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607707" version="1" comment="xen-devel is &lt;4.12.2_04-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607708" version="1" comment="xen-doc-html is &lt;4.12.2_04-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607709" version="1" comment="xen-libs is &lt;4.12.2_04-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607710" version="1" comment="xen-libs-32bit is &lt;4.12.2_04-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607711" version="1" comment="xen-tools is &lt;4.12.2_04-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607712" version="1" comment="xen-tools-domU is &lt;4.12.2_04-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608041" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608042" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608043" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608044" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608045" version="1" comment="openexr is &lt;2.2.1-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608046" version="1" comment="openexr-devel is &lt;2.2.1-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608047" version="1" comment="openexr-doc is &lt;2.2.1-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609836" version="1" comment="zabbix-agent is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294885" version="1" comment="zabbix-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609837" version="1" comment="zabbix-bash-completion is &lt;3.0.31-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294887" version="1" comment="zabbix-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609838" version="1" comment="zabbix-java-gateway is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294889" version="1" comment="zabbix-java-gateway is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609839" version="1" comment="zabbix-phpfrontend is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294891" version="1" comment="zabbix-phpfrontend is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609840" version="1" comment="zabbix-proxy is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294893" version="1" comment="zabbix-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609841" version="1" comment="zabbix-proxy-mysql is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294895" version="1" comment="zabbix-proxy-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609842" version="1" comment="zabbix-proxy-postgresql is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294897" version="1" comment="zabbix-proxy-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609843" version="1" comment="zabbix-proxy-sqlite is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294899" version="1" comment="zabbix-proxy-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609844" version="1" comment="zabbix-server is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294901" version="1" comment="zabbix-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609845" version="1" comment="zabbix-server-mysql is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294903" version="1" comment="zabbix-server-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609846" version="1" comment="zabbix-server-postgresql is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294905" version="1" comment="zabbix-server-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609847" version="1" comment="zabbix-server-sqlite is &lt;3.0.31-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294907" version="1" comment="zabbix-server-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608841" version="1" comment="libEMF-devel is &lt;1.0.7-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285808" version="1" comment="libEMF-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608842" version="1" comment="libEMF-utils is &lt;1.0.7-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285809" version="1" comment="libEMF-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608843" version="1" comment="libEMF1 is &lt;1.0.7-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285810" version="1" comment="libEMF1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609848" version="1" comment="audacity is &lt;2.2.2-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338701" version="1" comment="audacity is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609849" version="1" comment="audacity-lang is &lt;2.2.2-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338703" version="1" comment="audacity-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607963" version="1" comment="python2-markdown2 is &lt;2.3.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283130" version="1" comment="python2-markdown2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607964" version="1" comment="python3-markdown2 is &lt;2.3.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283131" version="1" comment="python3-markdown2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605009" version="1" comment="apache2 is &lt;2.4.33-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605010" version="1" comment="apache2-devel is &lt;2.4.33-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605011" version="1" comment="apache2-doc is &lt;2.4.33-lp151.8.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605012" version="1" comment="apache2-event is &lt;2.4.33-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605013" version="1" comment="apache2-example-pages is &lt;2.4.33-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605014" version="1" comment="apache2-prefork is &lt;2.4.33-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605015" version="1" comment="apache2-utils is &lt;2.4.33-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605016" version="1" comment="apache2-worker is &lt;2.4.33-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605876" version="1" comment="apache2 is &lt;2.4.33-lp151.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605877" version="1" comment="apache2-devel is &lt;2.4.33-lp151.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605878" version="1" comment="apache2-doc is &lt;2.4.33-lp151.8.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605879" version="1" comment="apache2-event is &lt;2.4.33-lp151.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605880" version="1" comment="apache2-example-pages is &lt;2.4.33-lp151.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605881" version="1" comment="apache2-prefork is &lt;2.4.33-lp151.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605882" version="1" comment="apache2-utils is &lt;2.4.33-lp151.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605883" version="1" comment="apache2-worker is &lt;2.4.33-lp151.8.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604378" version="1" comment="tomcat is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604379" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604380" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604381" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604382" version="1" comment="tomcat-embed is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604383" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604384" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604385" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604386" version="1" comment="tomcat-lib is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604387" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604388" version="1" comment="tomcat-webapps is &lt;9.0.36-lp151.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607864" version="1" comment="sqliteodbc is &lt;0.9996-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009282973" version="1" comment="sqliteodbc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607865" version="1" comment="sqliteodbc-doc is &lt;0.9996-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009282974" version="1" comment="sqliteodbc-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609505" version="1" comment="dovecot23 is &lt;2.3.11.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609506" version="1" comment="dovecot23-backend-mysql is &lt;2.3.11.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609507" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.11.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609508" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.11.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609509" version="1" comment="dovecot23-devel is &lt;2.3.11.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609510" version="1" comment="dovecot23-fts is &lt;2.3.11.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609511" version="1" comment="dovecot23-fts-lucene is &lt;2.3.11.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609512" version="1" comment="dovecot23-fts-solr is &lt;2.3.11.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609513" version="1" comment="dovecot23-fts-squat is &lt;2.3.11.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608058" version="1" comment="openconnect is &lt;7.08-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608059" version="1" comment="openconnect-devel is &lt;7.08-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608060" version="1" comment="openconnect-doc is &lt;7.08-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608061" version="1" comment="openconnect-lang is &lt;7.08-lp151.6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607972" version="1" comment="mailman is &lt;2.1.29-lp151.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607948" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607949" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp151.10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607950" version="1" comment="libldap-data is &lt;2.4.46-lp151.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607951" version="1" comment="openldap2 is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607952" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607953" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607954" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607955" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607956" version="1" comment="openldap2-client is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607957" version="1" comment="openldap2-contrib is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607958" version="1" comment="openldap2-devel is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607959" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp151.10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607960" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607961" version="1" comment="openldap2-doc is &lt;2.4.46-lp151.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607962" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp151.10.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607965" version="1" comment="ghostscript is &lt;9.52-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607966" version="1" comment="ghostscript-devel is &lt;9.52-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607967" version="1" comment="ghostscript-mini is &lt;9.52-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607968" version="1" comment="ghostscript-mini-devel is &lt;9.52-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607969" version="1" comment="ghostscript-x11 is &lt;9.52-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607970" version="1" comment="libspectre-devel is &lt;0.2.8-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236536" version="1" comment="libspectre-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607971" version="1" comment="libspectre1 is &lt;0.2.8-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236537" version="1" comment="libspectre1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606178" version="1" comment="kernel-firmware is &lt;20200107-lp151.2.15.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606179" version="1" comment="ucode-amd is &lt;20200107-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605559" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605560" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605561" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605562" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605563" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605564" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605565" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605566" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605567" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605568" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605569" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605570" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605571" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605572" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605573" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605574" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605575" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605576" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605577" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605578" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605579" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607847" version="1" comment="MozillaFirefox is &lt;68.8.0-lp151.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607848" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.8.0-lp151.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607849" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.8.0-lp151.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607850" version="1" comment="MozillaFirefox-devel is &lt;68.8.0-lp151.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607851" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-lp151.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607852" version="1" comment="MozillaFirefox-translations-other is &lt;68.8.0-lp151.2.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607933" version="1" comment="MozillaThunderbird is &lt;68.8.0-lp151.2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607934" version="1" comment="MozillaThunderbird-translations-common is &lt;68.8.0-lp151.2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607935" version="1" comment="MozillaThunderbird-translations-other is &lt;68.8.0-lp151.2.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608462" version="1" comment="MozillaThunderbird is &lt;68.9.0-lp151.2.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608463" version="1" comment="MozillaThunderbird-translations-common is &lt;68.9.0-lp151.2.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608464" version="1" comment="MozillaThunderbird-translations-other is &lt;68.9.0-lp151.2.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604355" version="1" comment="MozillaFirefox is &lt;78.0.1-lp151.2.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604356" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.0.1-lp151.2.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604357" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.0.1-lp151.2.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604358" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-lp151.2.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604359" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-lp151.2.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604360" version="1" comment="MozillaFirefox-translations-other is &lt;78.0.1-lp151.2.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609191" version="1" comment="libfreebl3 is &lt;3.53.1-lp151.2.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609192" version="1" comment="libfreebl3-32bit is &lt;3.53.1-lp151.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609193" version="1" comment="libfreebl3-hmac is &lt;3.53.1-lp151.2.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609194" version="1" comment="libfreebl3-hmac-32bit is &lt;3.53.1-lp151.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609195" version="1" comment="libsoftokn3 is &lt;3.53.1-lp151.2.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609196" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-lp151.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609197" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-lp151.2.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609198" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.53.1-lp151.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609199" version="1" comment="mozilla-nss is &lt;3.53.1-lp151.2.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609200" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-lp151.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609201" version="1" comment="mozilla-nss-certs is &lt;3.53.1-lp151.2.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609202" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-lp151.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609203" version="1" comment="mozilla-nss-devel is &lt;3.53.1-lp151.2.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609204" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-lp151.2.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609205" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.53.1-lp151.2.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609206" version="1" comment="mozilla-nss-tools is &lt;3.53.1-lp151.2.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608426" version="1" comment="MozillaFirefox is &lt;68.9.0-lp151.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608427" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.9.0-lp151.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608428" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.9.0-lp151.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608429" version="1" comment="MozillaFirefox-devel is &lt;68.9.0-lp151.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608430" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-lp151.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608431" version="1" comment="MozillaFirefox-translations-other is &lt;68.9.0-lp151.2.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609240" version="1" comment="MozillaThunderbird is &lt;68.10.0-lp151.2.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609241" version="1" comment="MozillaThunderbird-translations-common is &lt;68.10.0-lp151.2.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609242" version="1" comment="MozillaThunderbird-translations-other is &lt;68.10.0-lp151.2.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608256" version="1" comment="GraphicsMagick is &lt;1.3.29-lp151.4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608257" version="1" comment="GraphicsMagick-devel is &lt;1.3.29-lp151.4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608258" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.29-lp151.4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608259" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.29-lp151.4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608260" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.29-lp151.4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608261" version="1" comment="libGraphicsMagick3-config is &lt;1.3.29-lp151.4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608262" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.29-lp151.4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608263" version="1" comment="perl-GraphicsMagick is &lt;1.3.29-lp151.4.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604919" version="1" comment="dovecot23 is &lt;2.3.10-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604920" version="1" comment="dovecot23-backend-mysql is &lt;2.3.10-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604921" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.10-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604922" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.10-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604923" version="1" comment="dovecot23-devel is &lt;2.3.10-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604924" version="1" comment="dovecot23-fts is &lt;2.3.10-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604925" version="1" comment="dovecot23-fts-lucene is &lt;2.3.10-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604926" version="1" comment="dovecot23-fts-solr is &lt;2.3.10-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604927" version="1" comment="dovecot23-fts-squat is &lt;2.3.10-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605226" version="1" comment="libpmi0 is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605227" version="1" comment="libslurm33 is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605228" version="1" comment="perl-slurm is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605229" version="1" comment="slurm is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605230" version="1" comment="slurm-auth-none is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605231" version="1" comment="slurm-config is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605232" version="1" comment="slurm-config-man is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605233" version="1" comment="slurm-cray is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605234" version="1" comment="slurm-devel is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605235" version="1" comment="slurm-doc is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605236" version="1" comment="slurm-hdf5 is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605237" version="1" comment="slurm-lua is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605238" version="1" comment="slurm-munge is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605239" version="1" comment="slurm-node is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605240" version="1" comment="slurm-openlava is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605241" version="1" comment="slurm-pam_slurm is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605242" version="1" comment="slurm-plugins is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605243" version="1" comment="slurm-seff is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605244" version="1" comment="slurm-sjstat is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605245" version="1" comment="slurm-slurmdbd is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605246" version="1" comment="slurm-sql is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605247" version="1" comment="slurm-sview is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605248" version="1" comment="slurm-torque is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605249" version="1" comment="slurm-webdoc is &lt;18.08.9-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606722" version="1" comment="minidlna is &lt;1.3.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334739" version="1" comment="minidlna is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608283" version="1" comment="libreoffice is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608284" version="1" comment="libreoffice-base is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608285" version="1" comment="libreoffice-base-drivers-firebird is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608286" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608287" version="1" comment="libreoffice-branding-upstream is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608288" version="1" comment="libreoffice-calc is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608289" version="1" comment="libreoffice-calc-extensions is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608290" version="1" comment="libreoffice-draw is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608291" version="1" comment="libreoffice-filters-optional is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608292" version="1" comment="libreoffice-gdb-pretty-printers is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608293" version="1" comment="libreoffice-glade is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608294" version="1" comment="libreoffice-gnome is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608295" version="1" comment="libreoffice-gtk3 is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608296" version="1" comment="libreoffice-icon-themes is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608297" version="1" comment="libreoffice-impress is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608298" version="1" comment="libreoffice-l10n-af is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608299" version="1" comment="libreoffice-l10n-am is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608300" version="1" comment="libreoffice-l10n-ar is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608301" version="1" comment="libreoffice-l10n-as is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608302" version="1" comment="libreoffice-l10n-ast is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608303" version="1" comment="libreoffice-l10n-be is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608304" version="1" comment="libreoffice-l10n-bg is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608305" version="1" comment="libreoffice-l10n-bn is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608306" version="1" comment="libreoffice-l10n-bn_IN is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608307" version="1" comment="libreoffice-l10n-bo is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608308" version="1" comment="libreoffice-l10n-br is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608309" version="1" comment="libreoffice-l10n-brx is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608310" version="1" comment="libreoffice-l10n-bs is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608311" version="1" comment="libreoffice-l10n-ca is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608312" version="1" comment="libreoffice-l10n-ca_valencia is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608313" version="1" comment="libreoffice-l10n-cs is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608314" version="1" comment="libreoffice-l10n-cy is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608315" version="1" comment="libreoffice-l10n-da is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608316" version="1" comment="libreoffice-l10n-de is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608317" version="1" comment="libreoffice-l10n-dgo is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608318" version="1" comment="libreoffice-l10n-dsb is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608319" version="1" comment="libreoffice-l10n-dz is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608320" version="1" comment="libreoffice-l10n-el is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608321" version="1" comment="libreoffice-l10n-en is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608322" version="1" comment="libreoffice-l10n-en_GB is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608323" version="1" comment="libreoffice-l10n-en_ZA is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608324" version="1" comment="libreoffice-l10n-eo is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608325" version="1" comment="libreoffice-l10n-es is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608326" version="1" comment="libreoffice-l10n-et is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608327" version="1" comment="libreoffice-l10n-eu is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608328" version="1" comment="libreoffice-l10n-fa is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608329" version="1" comment="libreoffice-l10n-fi is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608330" version="1" comment="libreoffice-l10n-fr is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608331" version="1" comment="libreoffice-l10n-fy is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608332" version="1" comment="libreoffice-l10n-ga is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608333" version="1" comment="libreoffice-l10n-gd is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608334" version="1" comment="libreoffice-l10n-gl is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608335" version="1" comment="libreoffice-l10n-gu is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608336" version="1" comment="libreoffice-l10n-gug is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608337" version="1" comment="libreoffice-l10n-he is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608338" version="1" comment="libreoffice-l10n-hi is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608339" version="1" comment="libreoffice-l10n-hr is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608340" version="1" comment="libreoffice-l10n-hsb is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608341" version="1" comment="libreoffice-l10n-hu is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608342" version="1" comment="libreoffice-l10n-id is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608343" version="1" comment="libreoffice-l10n-is is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608344" version="1" comment="libreoffice-l10n-it is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608345" version="1" comment="libreoffice-l10n-ja is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608346" version="1" comment="libreoffice-l10n-ka is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608347" version="1" comment="libreoffice-l10n-kab is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608348" version="1" comment="libreoffice-l10n-kk is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608349" version="1" comment="libreoffice-l10n-km is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608350" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608351" version="1" comment="libreoffice-l10n-kn is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608352" version="1" comment="libreoffice-l10n-ko is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608353" version="1" comment="libreoffice-l10n-kok is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608354" version="1" comment="libreoffice-l10n-ks is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608355" version="1" comment="libreoffice-l10n-lb is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608356" version="1" comment="libreoffice-l10n-lo is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608357" version="1" comment="libreoffice-l10n-lt is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608358" version="1" comment="libreoffice-l10n-lv is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608359" version="1" comment="libreoffice-l10n-mai is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608360" version="1" comment="libreoffice-l10n-mk is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608361" version="1" comment="libreoffice-l10n-ml is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608362" version="1" comment="libreoffice-l10n-mn is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608363" version="1" comment="libreoffice-l10n-mni is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608364" version="1" comment="libreoffice-l10n-mr is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608365" version="1" comment="libreoffice-l10n-my is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608366" version="1" comment="libreoffice-l10n-nb is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608367" version="1" comment="libreoffice-l10n-ne is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608368" version="1" comment="libreoffice-l10n-nl is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608369" version="1" comment="libreoffice-l10n-nn is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608370" version="1" comment="libreoffice-l10n-nr is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608371" version="1" comment="libreoffice-l10n-nso is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608372" version="1" comment="libreoffice-l10n-oc is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608373" version="1" comment="libreoffice-l10n-om is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608374" version="1" comment="libreoffice-l10n-or is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608375" version="1" comment="libreoffice-l10n-pa is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608376" version="1" comment="libreoffice-l10n-pl is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608377" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608378" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608379" version="1" comment="libreoffice-l10n-ro is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608380" version="1" comment="libreoffice-l10n-ru is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608381" version="1" comment="libreoffice-l10n-rw is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608382" version="1" comment="libreoffice-l10n-sa_IN is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608383" version="1" comment="libreoffice-l10n-sat is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608384" version="1" comment="libreoffice-l10n-sd is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608385" version="1" comment="libreoffice-l10n-si is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608386" version="1" comment="libreoffice-l10n-sid is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608387" version="1" comment="libreoffice-l10n-sk is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608388" version="1" comment="libreoffice-l10n-sl is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608389" version="1" comment="libreoffice-l10n-sq is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608390" version="1" comment="libreoffice-l10n-sr is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608391" version="1" comment="libreoffice-l10n-ss is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608392" version="1" comment="libreoffice-l10n-st is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608393" version="1" comment="libreoffice-l10n-sv is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608394" version="1" comment="libreoffice-l10n-sw_TZ is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608395" version="1" comment="libreoffice-l10n-szl is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608396" version="1" comment="libreoffice-l10n-ta is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608397" version="1" comment="libreoffice-l10n-te is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608398" version="1" comment="libreoffice-l10n-tg is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608399" version="1" comment="libreoffice-l10n-th is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608400" version="1" comment="libreoffice-l10n-tn is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608401" version="1" comment="libreoffice-l10n-tr is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608402" version="1" comment="libreoffice-l10n-ts is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608403" version="1" comment="libreoffice-l10n-tt is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608404" version="1" comment="libreoffice-l10n-ug is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608405" version="1" comment="libreoffice-l10n-uk is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608406" version="1" comment="libreoffice-l10n-uz is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608407" version="1" comment="libreoffice-l10n-ve is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608408" version="1" comment="libreoffice-l10n-vec is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608409" version="1" comment="libreoffice-l10n-vi is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608410" version="1" comment="libreoffice-l10n-xh is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608411" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608412" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608413" version="1" comment="libreoffice-l10n-zu is &lt;6.4.4.2-lp151.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608414" version="1" comment="libreoffice-librelogo is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608415" version="1" comment="libreoffice-mailmerge is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608416" version="1" comment="libreoffice-math is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608417" version="1" comment="libreoffice-officebean is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608418" version="1" comment="libreoffice-pyuno is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608419" version="1" comment="libreoffice-qt5 is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608420" version="1" comment="libreoffice-sdk is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608421" version="1" comment="libreoffice-sdk-doc is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608422" version="1" comment="libreoffice-writer is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608423" version="1" comment="libreoffice-writer-extensions is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608424" version="1" comment="libreofficekit is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608425" version="1" comment="libreofficekit-devel is &lt;6.4.4.2-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604717" version="1" comment="libreoffice is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604718" version="1" comment="libreoffice-base is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604719" version="1" comment="libreoffice-base-drivers-firebird is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604720" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604721" version="1" comment="libreoffice-branding-upstream is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604722" version="1" comment="libreoffice-calc is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604723" version="1" comment="libreoffice-calc-extensions is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604724" version="1" comment="libreoffice-draw is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604725" version="1" comment="libreoffice-filters-optional is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604726" version="1" comment="libreoffice-gdb-pretty-printers is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604727" version="1" comment="libreoffice-glade is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604728" version="1" comment="libreoffice-gnome is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604729" version="1" comment="libreoffice-gtk3 is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604730" version="1" comment="libreoffice-icon-themes is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604731" version="1" comment="libreoffice-impress is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604732" version="1" comment="libreoffice-l10n-af is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604733" version="1" comment="libreoffice-l10n-am is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604734" version="1" comment="libreoffice-l10n-ar is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604735" version="1" comment="libreoffice-l10n-as is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604736" version="1" comment="libreoffice-l10n-ast is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604737" version="1" comment="libreoffice-l10n-be is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604738" version="1" comment="libreoffice-l10n-bg is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604739" version="1" comment="libreoffice-l10n-bn is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604740" version="1" comment="libreoffice-l10n-bn_IN is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604741" version="1" comment="libreoffice-l10n-bo is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604742" version="1" comment="libreoffice-l10n-br is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604743" version="1" comment="libreoffice-l10n-brx is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604744" version="1" comment="libreoffice-l10n-bs is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604745" version="1" comment="libreoffice-l10n-ca is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604746" version="1" comment="libreoffice-l10n-ca_valencia is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604747" version="1" comment="libreoffice-l10n-cs is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604748" version="1" comment="libreoffice-l10n-cy is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604749" version="1" comment="libreoffice-l10n-da is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604750" version="1" comment="libreoffice-l10n-de is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604751" version="1" comment="libreoffice-l10n-dgo is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604752" version="1" comment="libreoffice-l10n-dsb is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604753" version="1" comment="libreoffice-l10n-dz is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604754" version="1" comment="libreoffice-l10n-el is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604755" version="1" comment="libreoffice-l10n-en is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604756" version="1" comment="libreoffice-l10n-en_GB is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604757" version="1" comment="libreoffice-l10n-en_ZA is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604758" version="1" comment="libreoffice-l10n-eo is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604759" version="1" comment="libreoffice-l10n-es is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604760" version="1" comment="libreoffice-l10n-et is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604761" version="1" comment="libreoffice-l10n-eu is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604762" version="1" comment="libreoffice-l10n-fa is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604763" version="1" comment="libreoffice-l10n-fi is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604764" version="1" comment="libreoffice-l10n-fr is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604765" version="1" comment="libreoffice-l10n-fy is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604766" version="1" comment="libreoffice-l10n-ga is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604767" version="1" comment="libreoffice-l10n-gd is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604768" version="1" comment="libreoffice-l10n-gl is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604769" version="1" comment="libreoffice-l10n-gu is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604770" version="1" comment="libreoffice-l10n-gug is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604771" version="1" comment="libreoffice-l10n-he is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604772" version="1" comment="libreoffice-l10n-hi is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604773" version="1" comment="libreoffice-l10n-hr is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604774" version="1" comment="libreoffice-l10n-hsb is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604775" version="1" comment="libreoffice-l10n-hu is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604776" version="1" comment="libreoffice-l10n-id is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604777" version="1" comment="libreoffice-l10n-is is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604778" version="1" comment="libreoffice-l10n-it is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604779" version="1" comment="libreoffice-l10n-ja is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604780" version="1" comment="libreoffice-l10n-ka is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604781" version="1" comment="libreoffice-l10n-kab is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604782" version="1" comment="libreoffice-l10n-kk is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604783" version="1" comment="libreoffice-l10n-km is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604784" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604785" version="1" comment="libreoffice-l10n-kn is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604786" version="1" comment="libreoffice-l10n-ko is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604787" version="1" comment="libreoffice-l10n-kok is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604788" version="1" comment="libreoffice-l10n-ks is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604789" version="1" comment="libreoffice-l10n-lb is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604790" version="1" comment="libreoffice-l10n-lo is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604791" version="1" comment="libreoffice-l10n-lt is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604792" version="1" comment="libreoffice-l10n-lv is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604793" version="1" comment="libreoffice-l10n-mai is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604794" version="1" comment="libreoffice-l10n-mk is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604795" version="1" comment="libreoffice-l10n-ml is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604796" version="1" comment="libreoffice-l10n-mn is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604797" version="1" comment="libreoffice-l10n-mni is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604798" version="1" comment="libreoffice-l10n-mr is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604799" version="1" comment="libreoffice-l10n-my is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604800" version="1" comment="libreoffice-l10n-nb is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604801" version="1" comment="libreoffice-l10n-ne is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604802" version="1" comment="libreoffice-l10n-nl is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604803" version="1" comment="libreoffice-l10n-nn is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604804" version="1" comment="libreoffice-l10n-nr is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604805" version="1" comment="libreoffice-l10n-nso is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604806" version="1" comment="libreoffice-l10n-oc is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604807" version="1" comment="libreoffice-l10n-om is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604808" version="1" comment="libreoffice-l10n-or is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604809" version="1" comment="libreoffice-l10n-pa is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604810" version="1" comment="libreoffice-l10n-pl is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604811" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604812" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604813" version="1" comment="libreoffice-l10n-ro is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604814" version="1" comment="libreoffice-l10n-ru is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604815" version="1" comment="libreoffice-l10n-rw is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604816" version="1" comment="libreoffice-l10n-sa_IN is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604817" version="1" comment="libreoffice-l10n-sat is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604818" version="1" comment="libreoffice-l10n-sd is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604819" version="1" comment="libreoffice-l10n-si is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604820" version="1" comment="libreoffice-l10n-sid is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604821" version="1" comment="libreoffice-l10n-sk is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604822" version="1" comment="libreoffice-l10n-sl is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604823" version="1" comment="libreoffice-l10n-sq is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604824" version="1" comment="libreoffice-l10n-sr is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604825" version="1" comment="libreoffice-l10n-ss is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604826" version="1" comment="libreoffice-l10n-st is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604827" version="1" comment="libreoffice-l10n-sv is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604828" version="1" comment="libreoffice-l10n-sw_TZ is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604829" version="1" comment="libreoffice-l10n-szl is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604830" version="1" comment="libreoffice-l10n-ta is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604831" version="1" comment="libreoffice-l10n-te is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604832" version="1" comment="libreoffice-l10n-tg is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604833" version="1" comment="libreoffice-l10n-th is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604834" version="1" comment="libreoffice-l10n-tn is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604835" version="1" comment="libreoffice-l10n-tr is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604836" version="1" comment="libreoffice-l10n-ts is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604837" version="1" comment="libreoffice-l10n-tt is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604838" version="1" comment="libreoffice-l10n-ug is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604839" version="1" comment="libreoffice-l10n-uk is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604840" version="1" comment="libreoffice-l10n-uz is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604841" version="1" comment="libreoffice-l10n-ve is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604842" version="1" comment="libreoffice-l10n-vec is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604843" version="1" comment="libreoffice-l10n-vi is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604844" version="1" comment="libreoffice-l10n-xh is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604845" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604846" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604847" version="1" comment="libreoffice-l10n-zu is &lt;6.4.5.2-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604848" version="1" comment="libreoffice-librelogo is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604849" version="1" comment="libreoffice-mailmerge is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604850" version="1" comment="libreoffice-math is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604851" version="1" comment="libreoffice-officebean is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604852" version="1" comment="libreoffice-pyuno is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604853" version="1" comment="libreoffice-qt5 is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604854" version="1" comment="libreoffice-sdk is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604855" version="1" comment="libreoffice-sdk-doc is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604856" version="1" comment="libreoffice-writer is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604857" version="1" comment="libreoffice-writer-extensions is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604858" version="1" comment="libreofficekit is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604859" version="1" comment="libreofficekit-devel is &lt;6.4.5.2-lp151.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609348" version="1" comment="openconnect is &lt;7.08-lp151.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609349" version="1" comment="openconnect-devel is &lt;7.08-lp151.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609350" version="1" comment="openconnect-doc is &lt;7.08-lp151.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609351" version="1" comment="openconnect-lang is &lt;7.08-lp151.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605871" version="1" comment="sane-backends is &lt;1.0.31-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154031" version="1" comment="sane-backends is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605872" version="1" comment="sane-backends-32bit is &lt;1.0.31-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154032" version="1" comment="sane-backends-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605873" version="1" comment="sane-backends-autoconfig is &lt;1.0.31-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154033" version="1" comment="sane-backends-autoconfig is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605874" version="1" comment="sane-backends-devel is &lt;1.0.31-lp151.6.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154034" version="1" comment="sane-backends-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605875" version="1" comment="sane-backends-devel-32bit is &lt;1.0.31-lp151.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297781" version="1" comment="sane-backends-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608197" version="1" comment="libmariadb-devel is &lt;3.1.8-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608198" version="1" comment="libmariadb3 is &lt;3.1.8-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608199" version="1" comment="libmariadb3-32bit is &lt;3.1.8-lp151.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608200" version="1" comment="libmariadb_plugins is &lt;3.1.8-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608201" version="1" comment="libmariadbprivate is &lt;3.1.8-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609060" version="1" comment="libmysqld-devel is &lt;10.2.32-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609061" version="1" comment="libmysqld19 is &lt;10.2.32-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609062" version="1" comment="mariadb is &lt;10.2.32-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609063" version="1" comment="mariadb-bench is &lt;10.2.32-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609064" version="1" comment="mariadb-client is &lt;10.2.32-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609065" version="1" comment="mariadb-errormessages is &lt;10.2.32-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609066" version="1" comment="mariadb-galera is &lt;10.2.32-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609067" version="1" comment="mariadb-test is &lt;10.2.32-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609068" version="1" comment="mariadb-tools is &lt;10.2.32-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608908" version="1" comment="containerd is &lt;1.2.13-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608909" version="1" comment="containerd-ctr is &lt;1.2.13-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608910" version="1" comment="docker is &lt;19.03.11_ce-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608911" version="1" comment="docker-bash-completion is &lt;19.03.11_ce-lp151.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608912" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2902_153d0769a118-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608913" version="1" comment="docker-runc is &lt;1.0.0rc10+gitr3981_dc9208a3303f-lp151.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608914" version="1" comment="docker-test is &lt;19.03.11_ce-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608915" version="1" comment="docker-zsh-completion is &lt;19.03.11_ce-lp151.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608916" version="1" comment="golang-github-docker-libnetwork is &lt;0.7.0.1+gitr2902_153d0769a118-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609539" version="1" comment="libvlc5 is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609540" version="1" comment="libvlccore9 is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609541" version="1" comment="vlc is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609542" version="1" comment="vlc-codec-gstreamer is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609543" version="1" comment="vlc-devel is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609544" version="1" comment="vlc-jack is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609545" version="1" comment="vlc-lang is &lt;3.0.11.1-lp151.6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609546" version="1" comment="vlc-noX is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609547" version="1" comment="vlc-opencv is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609548" version="1" comment="vlc-qt is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609549" version="1" comment="vlc-vdpau is &lt;3.0.11.1-lp151.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606852" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.30.3-lp151.2.28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606853" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.30.3-lp151.2.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606854" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.30.3-lp151.2.28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606855" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.30.3-lp151.2.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606856" version="1" comment="libwebkit2gtk3-lang is &lt;2.30.3-lp151.2.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606857" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.30.3-lp151.2.28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606858" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.30.3-lp151.2.28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606859" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.30.3-lp151.2.28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606860" version="1" comment="webkit-jsc-4 is &lt;2.30.3-lp151.2.28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606861" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.30.3-lp151.2.28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606862" version="1" comment="webkit2gtk3-devel is &lt;2.30.3-lp151.2.28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606863" version="1" comment="webkit2gtk3-minibrowser is &lt;2.30.3-lp151.2.28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608255" version="1" comment="axel is &lt;2.17.8-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284618" version="1" comment="axel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608276" version="1" comment="alevtd is &lt;3.103-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284619" version="1" comment="alevtd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608277" version="1" comment="motv is &lt;3.103-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284620" version="1" comment="motv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608278" version="1" comment="pia is &lt;3.103-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284621" version="1" comment="pia is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608279" version="1" comment="tv-common is &lt;3.103-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284622" version="1" comment="tv-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608280" version="1" comment="v4l-conf is &lt;3.103-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284623" version="1" comment="v4l-conf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608281" version="1" comment="v4l-tools is &lt;3.103-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284624" version="1" comment="v4l-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608282" version="1" comment="xawtv is &lt;3.103-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009284625" version="1" comment="xawtv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604389" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604390" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.28.3-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604391" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604392" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.28.3-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604393" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.3-lp151.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604394" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604395" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604396" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604397" version="1" comment="webkit-jsc-4 is &lt;2.28.3-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604398" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604399" version="1" comment="webkit2gtk3-devel is &lt;2.28.3-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604400" version="1" comment="webkit2gtk3-minibrowser is &lt;2.28.3-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608441" version="1" comment="gnutls is &lt;3.6.7-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608442" version="1" comment="gnutls-guile is &lt;3.6.7-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608443" version="1" comment="libgnutls-dane-devel is &lt;3.6.7-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608444" version="1" comment="libgnutls-dane0 is &lt;3.6.7-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608445" version="1" comment="libgnutls-devel is &lt;3.6.7-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608446" version="1" comment="libgnutls-devel-32bit is &lt;3.6.7-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608447" version="1" comment="libgnutls30 is &lt;3.6.7-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608448" version="1" comment="libgnutls30-32bit is &lt;3.6.7-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608449" version="1" comment="libgnutls30-hmac is &lt;3.6.7-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608450" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608451" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608452" version="1" comment="libgnutlsxx28 is &lt;3.6.7-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605190" version="1" comment="libjpeg-turbo is &lt;1.5.3-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605191" version="1" comment="libjpeg62 is &lt;62.2.0-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605192" version="1" comment="libjpeg62-32bit is &lt;62.2.0-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605193" version="1" comment="libjpeg62-devel is &lt;62.2.0-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605194" version="1" comment="libjpeg62-devel-32bit is &lt;62.2.0-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605195" version="1" comment="libjpeg62-turbo is &lt;1.5.3-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605196" version="1" comment="libjpeg8 is &lt;8.1.2-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605197" version="1" comment="libjpeg8-32bit is &lt;8.1.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605198" version="1" comment="libjpeg8-devel is &lt;8.1.2-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605199" version="1" comment="libjpeg8-devel-32bit is &lt;8.1.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605200" version="1" comment="libturbojpeg0 is &lt;8.1.2-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605201" version="1" comment="libturbojpeg0-32bit is &lt;8.1.2-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605583" version="1" comment="cpp10 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296079" version="1" comment="cpp10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606821" version="1" comment="cpp7 is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605584" version="1" comment="cross-nvptx-gcc10 is &lt;10.2.1+git583-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296080" version="1" comment="cross-nvptx-gcc10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605585" version="1" comment="cross-nvptx-newlib10-devel is &lt;10.2.1+git583-lp151.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296081" version="1" comment="cross-nvptx-newlib10-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605586" version="1" comment="gcc10 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296082" version="1" comment="gcc10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605587" version="1" comment="gcc10-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296083" version="1" comment="gcc10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605588" version="1" comment="gcc10-ada is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296084" version="1" comment="gcc10-ada is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605589" version="1" comment="gcc10-ada-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296085" version="1" comment="gcc10-ada-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605590" version="1" comment="gcc10-c++ is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296086" version="1" comment="gcc10-c++ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605591" version="1" comment="gcc10-c++-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296087" version="1" comment="gcc10-c++-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605592" version="1" comment="gcc10-d is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296088" version="1" comment="gcc10-d is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605593" version="1" comment="gcc10-d-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296089" version="1" comment="gcc10-d-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605594" version="1" comment="gcc10-fortran is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296090" version="1" comment="gcc10-fortran is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605595" version="1" comment="gcc10-fortran-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296091" version="1" comment="gcc10-fortran-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605596" version="1" comment="gcc10-go is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296092" version="1" comment="gcc10-go is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605597" version="1" comment="gcc10-go-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296093" version="1" comment="gcc10-go-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605598" version="1" comment="gcc10-info is &lt;10.2.1+git583-lp151.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296094" version="1" comment="gcc10-info is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605599" version="1" comment="gcc10-locale is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296095" version="1" comment="gcc10-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605600" version="1" comment="gcc10-obj-c++ is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296096" version="1" comment="gcc10-obj-c++ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605601" version="1" comment="gcc10-obj-c++-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296097" version="1" comment="gcc10-obj-c++-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605602" version="1" comment="gcc10-objc is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296098" version="1" comment="gcc10-objc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605603" version="1" comment="gcc10-objc-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296099" version="1" comment="gcc10-objc-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606822" version="1" comment="gcc7 is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606823" version="1" comment="gcc7-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606824" version="1" comment="gcc7-ada is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606825" version="1" comment="gcc7-ada-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606826" version="1" comment="gcc7-c++ is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606827" version="1" comment="gcc7-c++-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606828" version="1" comment="gcc7-fortran is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606829" version="1" comment="gcc7-fortran-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606830" version="1" comment="gcc7-go is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606831" version="1" comment="gcc7-go-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606832" version="1" comment="gcc7-info is &lt;7.5.0+r278197-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606833" version="1" comment="gcc7-locale is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606834" version="1" comment="gcc7-obj-c++ is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606835" version="1" comment="gcc7-obj-c++-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606836" version="1" comment="gcc7-objc is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606837" version="1" comment="gcc7-objc-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605604" version="1" comment="libada10 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296100" version="1" comment="libada10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605605" version="1" comment="libada10-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296101" version="1" comment="libada10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606838" version="1" comment="libada7 is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606839" version="1" comment="libada7-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606840" version="1" comment="libasan4 is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606841" version="1" comment="libasan4-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605606" version="1" comment="libasan6 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296102" version="1" comment="libasan6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605607" version="1" comment="libasan6-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296103" version="1" comment="libasan6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605608" version="1" comment="libatomic1 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605609" version="1" comment="libatomic1-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606842" version="1" comment="libcilkrts5 is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606843" version="1" comment="libcilkrts5-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605610" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605611" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605612" version="1" comment="libgdruntime1 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296104" version="1" comment="libgdruntime1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605613" version="1" comment="libgdruntime1-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296105" version="1" comment="libgdruntime1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606844" version="1" comment="libgfortran4 is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606845" version="1" comment="libgfortran4-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605614" version="1" comment="libgfortran5 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605615" version="1" comment="libgfortran5-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606846" version="1" comment="libgo11 is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606847" version="1" comment="libgo11-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605616" version="1" comment="libgo16 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296106" version="1" comment="libgo16 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605617" version="1" comment="libgo16-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296107" version="1" comment="libgo16-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605618" version="1" comment="libgomp1 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605619" version="1" comment="libgomp1-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605620" version="1" comment="libgphobos1 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296108" version="1" comment="libgphobos1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605621" version="1" comment="libgphobos1-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296109" version="1" comment="libgphobos1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605622" version="1" comment="libitm1 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605623" version="1" comment="libitm1-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605624" version="1" comment="liblsan0 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605625" version="1" comment="libobjc4 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605626" version="1" comment="libobjc4-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605627" version="1" comment="libquadmath0 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605628" version="1" comment="libquadmath0-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605629" version="1" comment="libstdc++6 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605630" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605631" version="1" comment="libstdc++6-devel-gcc10 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296110" version="1" comment="libstdc++6-devel-gcc10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605632" version="1" comment="libstdc++6-devel-gcc10-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296111" version="1" comment="libstdc++6-devel-gcc10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606848" version="1" comment="libstdc++6-devel-gcc7 is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606849" version="1" comment="libstdc++6-devel-gcc7-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605633" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605634" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296112" version="1" comment="libstdc++6-pp-gcc10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605635" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296113" version="1" comment="libstdc++6-pp-gcc10-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605636" version="1" comment="libtsan0 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606850" version="1" comment="libubsan0 is &lt;7.5.0+r278197-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606851" version="1" comment="libubsan0-32bit is &lt;7.5.0+r278197-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605637" version="1" comment="libubsan1 is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605638" version="1" comment="libubsan1-32bit is &lt;10.2.1+git583-lp151.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605639" version="1" comment="nvptx-tools is &lt;1.0-lp151.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296114" version="1" comment="nvptx-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608816" version="1" comment="libupnp-devel is &lt;1.6.25-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156372" version="1" comment="libupnp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608817" version="1" comment="libupnp6 is &lt;1.6.25-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154113" version="1" comment="libupnp6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608818" version="1" comment="libupnp6-32bit is &lt;1.6.25-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156373" version="1" comment="libupnp6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604476" version="1" comment="python2-targetcli-fb is &lt;2.1.49-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009288926" version="1" comment="python2-targetcli-fb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604477" version="1" comment="python3-targetcli-fb is &lt;2.1.49-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009288927" version="1" comment="python3-targetcli-fb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604478" version="1" comment="targetcli-fb-common is &lt;2.1.49-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009288929" version="1" comment="targetcli-fb-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604444" version="1" comment="tomcat is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604445" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604446" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604447" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604448" version="1" comment="tomcat-embed is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604449" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604450" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604451" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604452" version="1" comment="tomcat-lib is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604453" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604454" version="1" comment="tomcat-webapps is &lt;9.0.36-lp151.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605991" version="1" comment="tomcat is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605992" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605993" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605994" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605995" version="1" comment="tomcat-embed is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605996" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605997" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605998" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605999" version="1" comment="tomcat-lib is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606000" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606001" version="1" comment="tomcat-webapps is &lt;9.0.36-lp151.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609850" version="1" comment="icinga2 is &lt;2.12.1-lp151.2.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297975" version="1" comment="icinga2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609851" version="1" comment="icinga2-bin is &lt;2.12.1-lp151.2.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297977" version="1" comment="icinga2-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609852" version="1" comment="icinga2-common is &lt;2.12.1-lp151.2.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297979" version="1" comment="icinga2-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609853" version="1" comment="icinga2-doc is &lt;2.12.1-lp151.2.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297981" version="1" comment="icinga2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609854" version="1" comment="icinga2-ido-mysql is &lt;2.12.1-lp151.2.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297983" version="1" comment="icinga2-ido-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609855" version="1" comment="icinga2-ido-pgsql is &lt;2.12.1-lp151.2.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297985" version="1" comment="icinga2-ido-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609856" version="1" comment="nano-icinga2 is &lt;2.12.1-lp151.2.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297987" version="1" comment="nano-icinga2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609857" version="1" comment="vim-icinga2 is &lt;2.12.1-lp151.2.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297989" version="1" comment="vim-icinga2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604419" version="1" comment="go1.13 is &lt;1.13.14-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287972" version="1" comment="go1.13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604420" version="1" comment="go1.13-doc is &lt;1.13.14-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287973" version="1" comment="go1.13-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604421" version="1" comment="go1.13-race is &lt;1.13.14-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287974" version="1" comment="go1.13-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605187" version="1" comment="go1.14 is &lt;1.14.7-lp151.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605188" version="1" comment="go1.14-doc is &lt;1.14.7-lp151.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605189" version="1" comment="go1.14-race is &lt;1.14.7-lp151.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609126" version="1" comment="squid is &lt;4.12-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609115" version="1" comment="mutt is &lt;1.10.1-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152082" version="1" comment="mutt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609116" version="1" comment="mutt-doc is &lt;1.10.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161283" version="1" comment="mutt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609117" version="1" comment="mutt-lang is &lt;1.10.1-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161284" version="1" comment="mutt-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609858" version="1" comment="neomutt is &lt;20201120-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302848" version="1" comment="neomutt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609859" version="1" comment="neomutt-doc is &lt;20201120-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302850" version="1" comment="neomutt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609860" version="1" comment="neomutt-lang is &lt;20201120-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302852" version="1" comment="neomutt-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606810" version="1" comment="openssh is &lt;7.9p1-lp151.4.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152110" version="1" comment="openssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606811" version="1" comment="openssh-askpass-gnome is &lt;7.9p1-lp151.4.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153167" version="1" comment="openssh-askpass-gnome is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606812" version="1" comment="openssh-cavs is &lt;7.9p1-lp151.4.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153168" version="1" comment="openssh-cavs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606813" version="1" comment="openssh-fips is &lt;7.9p1-lp151.4.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153169" version="1" comment="openssh-fips is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606814" version="1" comment="openssh-helpers is &lt;7.9p1-lp151.4.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152111" version="1" comment="openssh-helpers is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609861" version="1" comment="redis is &lt;4.0.14-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152049" version="1" comment="redis is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609049" version="1" comment="uftpd is &lt;2.12-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276159" version="1" comment="uftpd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609862" version="1" comment="pdns-recursor is &lt;4.1.12-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605884" version="1" comment="ctdb is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605885" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605886" version="1" comment="ctdb-tests is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605887" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605888" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605889" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605890" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605891" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605892" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605893" version="1" comment="libdcerpc0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605894" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605895" version="1" comment="libndr-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605896" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605897" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605898" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605899" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605900" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605901" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605902" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605903" version="1" comment="libndr-standard0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605904" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605905" version="1" comment="libndr0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605906" version="1" comment="libndr0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605907" version="1" comment="libnetapi-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605908" version="1" comment="libnetapi-devel-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605909" version="1" comment="libnetapi0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605910" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605911" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605912" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605913" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605914" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605915" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605916" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605917" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605918" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605919" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605920" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605921" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605922" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605923" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605924" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605925" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605926" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605927" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605928" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605929" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605930" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605931" version="1" comment="libsamba-util0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605932" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605933" version="1" comment="libsamdb-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605934" version="1" comment="libsamdb0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605935" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605936" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605937" version="1" comment="libsmbclient0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605938" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605939" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605940" version="1" comment="libsmbconf0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605941" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605942" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605943" version="1" comment="libsmbldap2 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605944" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605945" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605946" version="1" comment="libtevent-util0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605947" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605948" version="1" comment="libwbclient-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605949" version="1" comment="libwbclient0 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605950" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605951" version="1" comment="samba is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605952" version="1" comment="samba-ad-dc is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605953" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605954" version="1" comment="samba-ceph is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605955" version="1" comment="samba-client is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605956" version="1" comment="samba-client-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605957" version="1" comment="samba-core-devel is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605958" version="1" comment="samba-doc is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605959" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605960" version="1" comment="samba-libs is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605961" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605962" version="1" comment="samba-libs-python is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605963" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605964" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605965" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605966" version="1" comment="samba-pidl is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605967" version="1" comment="samba-python is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605968" version="1" comment="samba-python3 is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605969" version="1" comment="samba-test is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605970" version="1" comment="samba-winbind is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605971" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.383.7b7f8f14df8-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605479" version="1" comment="cifs-utils is &lt;6.9-lp151.4.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151261" version="1" comment="cifs-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605480" version="1" comment="cifs-utils-devel is &lt;6.9-lp151.4.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294754" version="1" comment="cifs-utils-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605481" version="1" comment="pam_cifscreds is &lt;6.9-lp151.4.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009294755" version="1" comment="pam_cifscreds is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604610" version="1" comment="libX11-6 is &lt;1.6.5-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151817" version="1" comment="libX11-6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604611" version="1" comment="libX11-6-32bit is &lt;1.6.5-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151818" version="1" comment="libX11-6-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604612" version="1" comment="libX11-data is &lt;1.6.5-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151819" version="1" comment="libX11-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604613" version="1" comment="libX11-devel is &lt;1.6.5-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151820" version="1" comment="libX11-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604614" version="1" comment="libX11-devel-32bit is &lt;1.6.5-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153719" version="1" comment="libX11-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604615" version="1" comment="libX11-xcb1 is &lt;1.6.5-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151821" version="1" comment="libX11-xcb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604616" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151822" version="1" comment="libX11-xcb1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604521" version="1" comment="libxcb-composite0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151866" version="1" comment="libxcb-composite0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604522" version="1" comment="libxcb-composite0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153818" version="1" comment="libxcb-composite0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604523" version="1" comment="libxcb-damage0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151867" version="1" comment="libxcb-damage0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604524" version="1" comment="libxcb-damage0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153819" version="1" comment="libxcb-damage0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604525" version="1" comment="libxcb-devel is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151868" version="1" comment="libxcb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604526" version="1" comment="libxcb-devel-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153820" version="1" comment="libxcb-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604527" version="1" comment="libxcb-devel-doc is &lt;1.13-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153821" version="1" comment="libxcb-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604528" version="1" comment="libxcb-dpms0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151869" version="1" comment="libxcb-dpms0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604529" version="1" comment="libxcb-dpms0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153822" version="1" comment="libxcb-dpms0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604530" version="1" comment="libxcb-dri2-0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151870" version="1" comment="libxcb-dri2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604531" version="1" comment="libxcb-dri2-0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151871" version="1" comment="libxcb-dri2-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604532" version="1" comment="libxcb-dri3-0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151872" version="1" comment="libxcb-dri3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604533" version="1" comment="libxcb-dri3-0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151873" version="1" comment="libxcb-dri3-0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604534" version="1" comment="libxcb-glx0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151874" version="1" comment="libxcb-glx0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604535" version="1" comment="libxcb-glx0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151875" version="1" comment="libxcb-glx0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604536" version="1" comment="libxcb-present0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151876" version="1" comment="libxcb-present0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604537" version="1" comment="libxcb-present0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151877" version="1" comment="libxcb-present0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604538" version="1" comment="libxcb-randr0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151878" version="1" comment="libxcb-randr0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604539" version="1" comment="libxcb-randr0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153823" version="1" comment="libxcb-randr0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604540" version="1" comment="libxcb-record0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151879" version="1" comment="libxcb-record0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604541" version="1" comment="libxcb-record0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153824" version="1" comment="libxcb-record0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604542" version="1" comment="libxcb-render0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151880" version="1" comment="libxcb-render0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604543" version="1" comment="libxcb-render0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151881" version="1" comment="libxcb-render0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604544" version="1" comment="libxcb-res0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151882" version="1" comment="libxcb-res0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604545" version="1" comment="libxcb-res0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153825" version="1" comment="libxcb-res0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604546" version="1" comment="libxcb-screensaver0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151883" version="1" comment="libxcb-screensaver0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604547" version="1" comment="libxcb-screensaver0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153826" version="1" comment="libxcb-screensaver0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604548" version="1" comment="libxcb-shape0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151884" version="1" comment="libxcb-shape0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604549" version="1" comment="libxcb-shape0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153827" version="1" comment="libxcb-shape0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604550" version="1" comment="libxcb-shm0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151885" version="1" comment="libxcb-shm0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604551" version="1" comment="libxcb-shm0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151886" version="1" comment="libxcb-shm0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604552" version="1" comment="libxcb-sync1 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151887" version="1" comment="libxcb-sync1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604553" version="1" comment="libxcb-sync1-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151888" version="1" comment="libxcb-sync1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604554" version="1" comment="libxcb-xf86dri0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151890" version="1" comment="libxcb-xf86dri0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604555" version="1" comment="libxcb-xf86dri0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153829" version="1" comment="libxcb-xf86dri0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604556" version="1" comment="libxcb-xfixes0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151891" version="1" comment="libxcb-xfixes0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604557" version="1" comment="libxcb-xfixes0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151892" version="1" comment="libxcb-xfixes0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604558" version="1" comment="libxcb-xinerama0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151893" version="1" comment="libxcb-xinerama0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604559" version="1" comment="libxcb-xinerama0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153830" version="1" comment="libxcb-xinerama0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604560" version="1" comment="libxcb-xinput0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177183" version="1" comment="libxcb-xinput0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604561" version="1" comment="libxcb-xinput0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289014" version="1" comment="libxcb-xinput0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604562" version="1" comment="libxcb-xkb1 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151894" version="1" comment="libxcb-xkb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604563" version="1" comment="libxcb-xkb1-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153831" version="1" comment="libxcb-xkb1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604564" version="1" comment="libxcb-xtest0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151896" version="1" comment="libxcb-xtest0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604565" version="1" comment="libxcb-xtest0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153833" version="1" comment="libxcb-xtest0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604566" version="1" comment="libxcb-xv0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151897" version="1" comment="libxcb-xv0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604567" version="1" comment="libxcb-xv0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153834" version="1" comment="libxcb-xv0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604568" version="1" comment="libxcb-xvmc0 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151898" version="1" comment="libxcb-xvmc0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604569" version="1" comment="libxcb-xvmc0-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153835" version="1" comment="libxcb-xvmc0-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604570" version="1" comment="libxcb1 is &lt;1.13-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151899" version="1" comment="libxcb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604571" version="1" comment="libxcb1-32bit is &lt;1.13-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151900" version="1" comment="libxcb1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604995" version="1" comment="xorg-x11-server is &lt;1.20.3-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151420" version="1" comment="xorg-x11-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604996" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151421" version="1" comment="xorg-x11-server-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604997" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151422" version="1" comment="xorg-x11-server-sdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604998" version="1" comment="xorg-x11-server-source is &lt;1.20.3-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157107" version="1" comment="xorg-x11-server-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604999" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177168" version="1" comment="xorg-x11-server-wayland is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604928" version="1" comment="libecpg6 is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604929" version="1" comment="libpq5 is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605036" version="1" comment="postgresql10 is &lt;10.14-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605037" version="1" comment="postgresql10-contrib is &lt;10.14-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605038" version="1" comment="postgresql10-devel is &lt;10.14-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605039" version="1" comment="postgresql10-docs is &lt;10.14-lp151.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605040" version="1" comment="postgresql10-plperl is &lt;10.14-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605041" version="1" comment="postgresql10-plpython is &lt;10.14-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605042" version="1" comment="postgresql10-pltcl is &lt;10.14-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605043" version="1" comment="postgresql10-server is &lt;10.14-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605044" version="1" comment="postgresql10-test is &lt;10.14-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604930" version="1" comment="postgresql12 is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604931" version="1" comment="postgresql12-contrib is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604932" version="1" comment="postgresql12-devel is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604933" version="1" comment="postgresql12-docs is &lt;12.4-lp151.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604934" version="1" comment="postgresql12-llvmjit is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604935" version="1" comment="postgresql12-plperl is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604936" version="1" comment="postgresql12-plpython is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604937" version="1" comment="postgresql12-pltcl is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604938" version="1" comment="postgresql12-server is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604939" version="1" comment="postgresql12-server-devel is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604940" version="1" comment="postgresql12-test is &lt;12.4-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606650" version="1" comment="xorg-x11-server is &lt;1.20.3-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606651" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606652" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606653" version="1" comment="xorg-x11-server-source is &lt;1.20.3-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606654" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605150" version="1" comment="xorg-x11-server is &lt;1.20.3-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605151" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605152" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605153" version="1" comment="xorg-x11-server-source is &lt;1.20.3-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605154" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605143" version="1" comment="libX11-6 is &lt;1.6.5-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605144" version="1" comment="libX11-6-32bit is &lt;1.6.5-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605145" version="1" comment="libX11-data is &lt;1.6.5-lp151.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605146" version="1" comment="libX11-devel is &lt;1.6.5-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605147" version="1" comment="libX11-devel-32bit is &lt;1.6.5-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605148" version="1" comment="libX11-xcb1 is &lt;1.6.5-lp151.4.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605149" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606326" version="1" comment="podman is &lt;2.1.1-lp151.3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606327" version="1" comment="podman-cni-config is &lt;2.1.1-lp151.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605486" version="1" comment="dpdk is &lt;18.11.9-lp151.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605487" version="1" comment="dpdk-devel is &lt;18.11.9-lp151.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605488" version="1" comment="dpdk-doc is &lt;18.11.9-lp151.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605489" version="1" comment="dpdk-examples is &lt;18.11.9-lp151.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605490" version="1" comment="dpdk-kmp-default is &lt;18.11.9_k4.12.14_lp151.28.67-lp151.3.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605491" version="1" comment="dpdk-tools is &lt;18.11.9-lp151.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605492" version="1" comment="libdpdk-18_11 is &lt;18.11.9-lp151.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605292" version="1" comment="perl-DBI is &lt;1.639-lp151.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609342" version="1" comment="python-ipaddress is &lt;1.0.18-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287509" version="1" comment="python-ipaddress is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604582" version="1" comment="java-11-openjdk is &lt;11.0.8.0-lp151.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604583" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.8.0-lp151.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604584" version="1" comment="java-11-openjdk-demo is &lt;11.0.8.0-lp151.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604585" version="1" comment="java-11-openjdk-devel is &lt;11.0.8.0-lp151.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604586" version="1" comment="java-11-openjdk-headless is &lt;11.0.8.0-lp151.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604587" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.8.0-lp151.3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604588" version="1" comment="java-11-openjdk-jmods is &lt;11.0.8.0-lp151.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604589" version="1" comment="java-11-openjdk-src is &lt;11.0.8.0-lp151.3.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606339" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606340" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.272-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606341" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606342" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606343" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606344" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.272-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606345" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.272-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605293" version="1" comment="python3-virtualbox is &lt;6.0.24-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605294" version="1" comment="virtualbox is &lt;6.0.24-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605295" version="1" comment="virtualbox-devel is &lt;6.0.24-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605296" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.0.24-lp151.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605297" version="1" comment="virtualbox-guest-source is &lt;6.0.24-lp151.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605298" version="1" comment="virtualbox-guest-tools is &lt;6.0.24-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605299" version="1" comment="virtualbox-guest-x11 is &lt;6.0.24-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605300" version="1" comment="virtualbox-host-source is &lt;6.0.24-lp151.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605301" version="1" comment="virtualbox-kmp-default is &lt;6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286913" version="1" comment="virtualbox-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605302" version="1" comment="virtualbox-qt is &lt;6.0.24-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605303" version="1" comment="virtualbox-vnc is &lt;6.0.24-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605304" version="1" comment="virtualbox-websrv is &lt;6.0.24-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605305" version="1" comment="ctdb is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605306" version="1" comment="ctdb-pcp-pmda is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605307" version="1" comment="ctdb-tests is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605308" version="1" comment="libdcerpc-binding0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605309" version="1" comment="libdcerpc-binding0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605310" version="1" comment="libdcerpc-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605311" version="1" comment="libdcerpc-samr-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605312" version="1" comment="libdcerpc-samr0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605313" version="1" comment="libdcerpc-samr0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605314" version="1" comment="libdcerpc0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605315" version="1" comment="libdcerpc0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605316" version="1" comment="libndr-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605317" version="1" comment="libndr-krb5pac-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605318" version="1" comment="libndr-krb5pac0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605319" version="1" comment="libndr-krb5pac0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605320" version="1" comment="libndr-nbt-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605321" version="1" comment="libndr-nbt0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605322" version="1" comment="libndr-nbt0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605323" version="1" comment="libndr-standard-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605324" version="1" comment="libndr-standard0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605325" version="1" comment="libndr-standard0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605326" version="1" comment="libndr0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605327" version="1" comment="libndr0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605328" version="1" comment="libnetapi-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605329" version="1" comment="libnetapi-devel-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605330" version="1" comment="libnetapi0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605331" version="1" comment="libnetapi0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605332" version="1" comment="libsamba-credentials-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605333" version="1" comment="libsamba-credentials0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605334" version="1" comment="libsamba-credentials0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605335" version="1" comment="libsamba-errors-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605336" version="1" comment="libsamba-errors0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605337" version="1" comment="libsamba-errors0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605338" version="1" comment="libsamba-hostconfig-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605339" version="1" comment="libsamba-hostconfig0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605340" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605341" version="1" comment="libsamba-passdb-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605342" version="1" comment="libsamba-passdb0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605343" version="1" comment="libsamba-passdb0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605344" version="1" comment="libsamba-policy-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605345" version="1" comment="libsamba-policy-python-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605346" version="1" comment="libsamba-policy-python3-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605347" version="1" comment="libsamba-policy0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605348" version="1" comment="libsamba-policy0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605349" version="1" comment="libsamba-policy0-python3 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605350" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605351" version="1" comment="libsamba-util-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605352" version="1" comment="libsamba-util0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605353" version="1" comment="libsamba-util0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605354" version="1" comment="libsamdb-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605355" version="1" comment="libsamdb0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605356" version="1" comment="libsamdb0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605357" version="1" comment="libsmbclient-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605358" version="1" comment="libsmbclient0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605359" version="1" comment="libsmbclient0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605360" version="1" comment="libsmbconf-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605361" version="1" comment="libsmbconf0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605362" version="1" comment="libsmbconf0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605363" version="1" comment="libsmbldap-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605364" version="1" comment="libsmbldap2 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605365" version="1" comment="libsmbldap2-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605366" version="1" comment="libtevent-util-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605367" version="1" comment="libtevent-util0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605368" version="1" comment="libtevent-util0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605369" version="1" comment="libwbclient-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605370" version="1" comment="libwbclient0 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605371" version="1" comment="libwbclient0-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605372" version="1" comment="samba is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605373" version="1" comment="samba-ad-dc is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605374" version="1" comment="samba-ad-dc-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605375" version="1" comment="samba-ceph is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605376" version="1" comment="samba-client is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605377" version="1" comment="samba-client-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605378" version="1" comment="samba-core-devel is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605379" version="1" comment="samba-doc is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605380" version="1" comment="samba-dsdb-modules is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605381" version="1" comment="samba-libs is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605382" version="1" comment="samba-libs-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605383" version="1" comment="samba-libs-python is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605384" version="1" comment="samba-libs-python-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605385" version="1" comment="samba-libs-python3 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605386" version="1" comment="samba-libs-python3-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605387" version="1" comment="samba-pidl is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605388" version="1" comment="samba-python is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605389" version="1" comment="samba-python3 is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605390" version="1" comment="samba-test is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605391" version="1" comment="samba-winbind is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605392" version="1" comment="samba-winbind-32bit is &lt;4.9.5+git.373.26895a83dbf-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606625" version="1" comment="libmariadb-devel is &lt;3.1.11-lp151.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606626" version="1" comment="libmariadb3 is &lt;3.1.11-lp151.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606627" version="1" comment="libmariadb3-32bit is &lt;3.1.11-lp151.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606628" version="1" comment="libmariadb_plugins is &lt;3.1.11-lp151.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606629" version="1" comment="libmariadbprivate is &lt;3.1.11-lp151.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606630" version="1" comment="libmysqld-devel is &lt;10.2.36-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606631" version="1" comment="libmysqld19 is &lt;10.2.36-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606632" version="1" comment="mariadb is &lt;10.2.36-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606633" version="1" comment="mariadb-bench is &lt;10.2.36-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606634" version="1" comment="mariadb-client is &lt;10.2.36-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606635" version="1" comment="mariadb-errormessages is &lt;10.2.36-lp151.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606636" version="1" comment="mariadb-galera is &lt;10.2.36-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606637" version="1" comment="mariadb-test is &lt;10.2.36-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606638" version="1" comment="mariadb-tools is &lt;10.2.36-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606205" version="1" comment="java-11-openjdk is &lt;11.0.9.0-lp151.3.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606206" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.9.0-lp151.3.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606207" version="1" comment="java-11-openjdk-demo is &lt;11.0.9.0-lp151.3.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606208" version="1" comment="java-11-openjdk-devel is &lt;11.0.9.0-lp151.3.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606209" version="1" comment="java-11-openjdk-headless is &lt;11.0.9.0-lp151.3.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606210" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.9.0-lp151.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606211" version="1" comment="java-11-openjdk-jmods is &lt;11.0.9.0-lp151.3.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606212" version="1" comment="java-11-openjdk-src is &lt;11.0.9.0-lp151.3.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609157" version="1" comment="chocolate-doom is &lt;3.0.1-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286911" version="1" comment="chocolate-doom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609158" version="1" comment="chocolate-doom-bash-completion is &lt;3.0.1-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286912" version="1" comment="chocolate-doom-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605085" version="1" comment="squid is &lt;4.13-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605504" version="1" comment="nodejs8 is &lt;8.17.0-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605505" version="1" comment="nodejs8-devel is &lt;8.17.0-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605506" version="1" comment="nodejs8-docs is &lt;8.17.0-lp151.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605507" version="1" comment="npm8 is &lt;8.17.0-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605067" version="1" comment="freerdp is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605068" version="1" comment="freerdp-devel is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605069" version="1" comment="freerdp-proxy is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605070" version="1" comment="freerdp-server is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605071" version="1" comment="freerdp-wayland is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605072" version="1" comment="libfreerdp2 is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605073" version="1" comment="libuwac0-0 is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605074" version="1" comment="libwinpr2 is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605075" version="1" comment="uwac0-0-devel is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605076" version="1" comment="winpr2-devel is &lt;2.1.2-lp151.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606127" version="1" comment="libunwind is &lt;1.2.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177215" version="1" comment="libunwind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606128" version="1" comment="libunwind-32bit is &lt;1.2.1-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243091" version="1" comment="libunwind-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606129" version="1" comment="libunwind-devel is &lt;1.2.1-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243092" version="1" comment="libunwind-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606130" version="1" comment="libzmq5 is &lt;4.2.3-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606131" version="1" comment="zeromq-devel is &lt;4.2.3-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606132" version="1" comment="zeromq-tools is &lt;4.2.3-lp151.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605803" version="1" comment="singularity is &lt;3.6.4-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609243" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp151.4.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609244" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp151.4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609245" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp151.4.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609246" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp151.4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609247" version="1" comment="openexr is &lt;2.2.1-lp151.4.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609248" version="1" comment="openexr-devel is &lt;2.2.1-lp151.4.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609249" version="1" comment="openexr-doc is &lt;2.2.1-lp151.4.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604627" version="1" comment="hylafax+ is &lt;7.0.3-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235038" version="1" comment="hylafax+ is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604628" version="1" comment="hylafax+-client is &lt;7.0.3-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235040" version="1" comment="hylafax+-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604629" version="1" comment="libfaxutil7_0_3 is &lt;7.0.3-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289522" version="1" comment="libfaxutil7_0_3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604422" version="1" comment="libraw-devel is &lt;0.18.9-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151901" version="1" comment="libraw-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604423" version="1" comment="libraw-devel-static is &lt;0.18.9-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153172" version="1" comment="libraw-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604424" version="1" comment="libraw-tools is &lt;0.18.9-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153173" version="1" comment="libraw-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604425" version="1" comment="libraw16 is &lt;0.18.9-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177187" version="1" comment="libraw16 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604484" version="1" comment="MozillaFirefox is &lt;78.1.0-lp151.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604485" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.1.0-lp151.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604486" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.1.0-lp151.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604487" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-lp151.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604488" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-lp151.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604489" version="1" comment="MozillaFirefox-translations-other is &lt;78.1.0-lp151.2.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604594" version="1" comment="MozillaThunderbird is &lt;68.11.0-lp151.2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604595" version="1" comment="MozillaThunderbird-translations-common is &lt;68.11.0-lp151.2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604596" version="1" comment="MozillaThunderbird-translations-other is &lt;68.11.0-lp151.2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605179" version="1" comment="MozillaFirefox is &lt;78.2.0-lp151.2.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605180" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.2.0-lp151.2.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605181" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.2.0-lp151.2.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605182" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-lp151.2.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605183" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-lp151.2.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605184" version="1" comment="MozillaFirefox-translations-other is &lt;78.2.0-lp151.2.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605176" version="1" comment="MozillaThunderbird is &lt;68.12.0-lp151.2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605177" version="1" comment="MozillaThunderbird-translations-common is &lt;68.12.0-lp151.2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605178" version="1" comment="MozillaThunderbird-translations-other is &lt;68.12.0-lp151.2.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605426" version="1" comment="MozillaFirefox is &lt;78.3.0-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605427" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.3.0-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605428" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.3.0-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605429" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605430" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605431" version="1" comment="MozillaFirefox-translations-other is &lt;78.3.0-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605839" version="1" comment="MozillaThunderbird is &lt;78.4.0-lp151.2.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605840" version="1" comment="MozillaThunderbird-translations-common is &lt;78.4.0-lp151.2.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605841" version="1" comment="MozillaThunderbird-translations-other is &lt;78.4.0-lp151.2.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605842" version="1" comment="mozilla-nspr is &lt;4.25.1-lp151.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605843" version="1" comment="mozilla-nspr-32bit is &lt;4.25.1-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605844" version="1" comment="mozilla-nspr-devel is &lt;4.25.1-lp151.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605709" version="1" comment="MozillaFirefox is &lt;78.4.0-lp151.2.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605710" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.4.0-lp151.2.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605711" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.4.0-lp151.2.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605712" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-lp151.2.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605713" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-lp151.2.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605714" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.0-lp151.2.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609475" version="1" comment="MozillaThunderbird is &lt;78.7.0-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609476" version="1" comment="MozillaThunderbird-translations-common is &lt;78.7.0-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609477" version="1" comment="MozillaThunderbird-translations-other is &lt;78.7.0-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605000" version="1" comment="grub2 is &lt;2.02-lp151.21.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605001" version="1" comment="grub2-branding-upstream is &lt;2.02-lp151.21.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605002" version="1" comment="grub2-i386-efi is &lt;2.02-lp151.21.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605003" version="1" comment="grub2-i386-pc is &lt;2.02-lp151.21.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605004" version="1" comment="grub2-i386-xen is &lt;2.02-lp151.21.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605005" version="1" comment="grub2-snapper-plugin is &lt;2.02-lp151.21.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605006" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-lp151.21.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605007" version="1" comment="grub2-x86_64-efi is &lt;2.02-lp151.21.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605008" version="1" comment="grub2-x86_64-xen is &lt;2.02-lp151.21.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605805" version="1" comment="libvirt is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605806" version="1" comment="libvirt-admin is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605807" version="1" comment="libvirt-bash-completion is &lt;5.1.0-lp151.7.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605808" version="1" comment="libvirt-client is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605809" version="1" comment="libvirt-daemon is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605810" version="1" comment="libvirt-daemon-config-network is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605811" version="1" comment="libvirt-daemon-config-nwfilter is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605812" version="1" comment="libvirt-daemon-driver-interface is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605813" version="1" comment="libvirt-daemon-driver-libxl is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605814" version="1" comment="libvirt-daemon-driver-lxc is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605815" version="1" comment="libvirt-daemon-driver-network is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605816" version="1" comment="libvirt-daemon-driver-nodedev is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605817" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605818" version="1" comment="libvirt-daemon-driver-qemu is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605819" version="1" comment="libvirt-daemon-driver-secret is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605820" version="1" comment="libvirt-daemon-driver-storage is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605821" version="1" comment="libvirt-daemon-driver-storage-core is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605822" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605823" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605824" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605825" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605826" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605827" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605828" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605829" version="1" comment="libvirt-daemon-hooks is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605830" version="1" comment="libvirt-daemon-lxc is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605831" version="1" comment="libvirt-daemon-qemu is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605832" version="1" comment="libvirt-daemon-xen is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605833" version="1" comment="libvirt-devel is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605834" version="1" comment="libvirt-doc is &lt;5.1.0-lp151.7.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605835" version="1" comment="libvirt-libs is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605836" version="1" comment="libvirt-lock-sanlock is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605837" version="1" comment="libvirt-nss is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605838" version="1" comment="wireshark-plugin-libvirt is &lt;5.1.0-lp151.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605202" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605203" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp151.10.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605204" version="1" comment="libldap-data is &lt;2.4.46-lp151.10.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605205" version="1" comment="openldap2 is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605206" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605207" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605208" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605209" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605210" version="1" comment="openldap2-client is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605211" version="1" comment="openldap2-contrib is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605212" version="1" comment="openldap2-devel is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605213" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp151.10.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605214" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605215" version="1" comment="openldap2-doc is &lt;2.4.46-lp151.10.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605216" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp151.10.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604479" version="1" comment="ghostscript is &lt;9.52-lp151.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604480" version="1" comment="ghostscript-devel is &lt;9.52-lp151.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604481" version="1" comment="ghostscript-mini is &lt;9.52-lp151.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604482" version="1" comment="ghostscript-mini-devel is &lt;9.52-lp151.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604483" version="1" comment="ghostscript-x11 is &lt;9.52-lp151.3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609863" version="1" comment="claws-mail is &lt;3.17.8-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151767" version="1" comment="claws-mail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609864" version="1" comment="claws-mail-devel is &lt;3.17.8-lp151.2.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153189" version="1" comment="claws-mail-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609865" version="1" comment="claws-mail-lang is &lt;3.17.8-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151768" version="1" comment="claws-mail-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609866" version="1" comment="chromedriver is &lt;85.0.4183.102-lp151.2.133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609867" version="1" comment="chromium is &lt;85.0.4183.102-lp151.2.133.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609868" version="1" comment="opera is &lt;71.0.3770.228-lp151.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609869" version="1" comment="chromedriver is &lt;85.0.4183.121-lp151.2.136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609870" version="1" comment="chromium is &lt;85.0.4183.121-lp151.2.136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609871" version="1" comment="chromedriver is &lt;86.0.4240.75-lp151.2.144.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609872" version="1" comment="chromium is &lt;86.0.4240.75-lp151.2.144.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609873" version="1" comment="gn is &lt;0.1807-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296733" version="1" comment="gn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609493" version="1" comment="chromedriver is &lt;87.0.4280.141-lp151.2.165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609494" version="1" comment="chromium is &lt;87.0.4280.141-lp151.2.165.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609438" version="1" comment="opera is &lt;73.0.3856.344-lp151.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606259" version="1" comment="MozillaFirefox is &lt;78.5.0-lp151.2.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606260" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.5.0-lp151.2.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606261" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.5.0-lp151.2.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606262" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-lp151.2.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606263" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-lp151.2.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606264" version="1" comment="MozillaFirefox-translations-other is &lt;78.5.0-lp151.2.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606655" version="1" comment="MozillaThunderbird is &lt;78.5.0-lp151.2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606656" version="1" comment="MozillaThunderbird-translations-common is &lt;78.5.0-lp151.2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606657" version="1" comment="MozillaThunderbird-translations-other is &lt;78.5.0-lp151.2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605693" version="1" comment="chromedriver is &lt;86.0.4240.111-lp151.2.147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605694" version="1" comment="chromium is &lt;86.0.4240.111-lp151.2.147.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605715" version="1" comment="freetype2-devel is &lt;2.10.1-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605716" version="1" comment="freetype2-devel-32bit is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605717" version="1" comment="freetype2-profile-tti35 is &lt;2.10.1-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605718" version="1" comment="ft2demos is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605719" version="1" comment="ftbench is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605720" version="1" comment="ftdiff is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605721" version="1" comment="ftdump is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605722" version="1" comment="ftgamma is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605723" version="1" comment="ftgrid is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605724" version="1" comment="ftinspect is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605725" version="1" comment="ftlint is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605726" version="1" comment="ftmulti is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605727" version="1" comment="ftstring is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605728" version="1" comment="ftvalid is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605729" version="1" comment="ftview is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605730" version="1" comment="libfreetype6 is &lt;2.10.1-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605731" version="1" comment="libfreetype6-32bit is &lt;2.10.1-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609874" version="1" comment="opera is &lt;72.0.3815.320-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609875" version="1" comment="chromedriver is &lt;86.0.4240.183-lp151.2.150.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609876" version="1" comment="chromium is &lt;86.0.4240.183-lp151.2.150.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609877" version="1" comment="chromedriver is &lt;86.0.4240.198-lp151.2.153.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609878" version="1" comment="chromium is &lt;86.0.4240.198-lp151.2.153.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609879" version="1" comment="opera is &lt;72.0.3815.400-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606731" version="1" comment="chromedriver is &lt;87.0.4280.88-lp151.2.162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606732" version="1" comment="chromium is &lt;87.0.4280.88-lp151.2.162.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606935" version="1" comment="opera is &lt;73.0.3856.284-lp151.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606877" version="1" comment="MozillaFirefox is &lt;78.6.0-lp151.2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606878" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.6.0-lp151.2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606879" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.6.0-lp151.2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606880" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-lp151.2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606881" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-lp151.2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606882" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.0-lp151.2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606874" version="1" comment="MozillaThunderbird is &lt;78.6.0-lp151.2.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606875" version="1" comment="MozillaThunderbird-translations-common is &lt;78.6.0-lp151.2.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606876" version="1" comment="MozillaThunderbird-translations-other is &lt;78.6.0-lp151.2.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609499" version="1" comment="MozillaFirefox is &lt;78.6.1-lp151.2.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609500" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.6.1-lp151.2.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609501" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.6.1-lp151.2.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609502" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-lp151.2.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609503" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-lp151.2.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609504" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.1-lp151.2.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609428" version="1" comment="MozillaThunderbird is &lt;78.6.1-lp151.2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609429" version="1" comment="MozillaThunderbird-translations-common is &lt;78.6.1-lp151.2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609430" version="1" comment="MozillaThunderbird-translations-other is &lt;78.6.1-lp151.2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609463" version="1" comment="chromedriver is &lt;88.0.4324.96-lp151.2.171.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609464" version="1" comment="chromium is &lt;88.0.4324.96-lp151.2.171.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609880" version="1" comment="ark is &lt;18.12.3-lp151.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154016" version="1" comment="ark is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609881" version="1" comment="ark-lang is &lt;18.12.3-lp151.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289271" version="1" comment="ark-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609882" version="1" comment="libkerfuffle18 is &lt;18.12.3-lp151.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289272" version="1" comment="libkerfuffle18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604619" version="1" comment="balsa is &lt;2.5.5-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289523" version="1" comment="balsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604620" version="1" comment="balsa-lang is &lt;2.5.5-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289524" version="1" comment="balsa-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606800" version="1" comment="PackageKit is &lt;1.1.10-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606801" version="1" comment="PackageKit-backend-zypp is &lt;1.1.10-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606802" version="1" comment="PackageKit-branding-upstream is &lt;1.1.10-lp151.8.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606803" version="1" comment="PackageKit-devel is &lt;1.1.10-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606804" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.10-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606805" version="1" comment="PackageKit-gtk3-module is &lt;1.1.10-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606806" version="1" comment="PackageKit-lang is &lt;1.1.10-lp151.8.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606807" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.10-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606808" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.10-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606809" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.10-lp151.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606749" version="1" comment="gdm is &lt;3.26.2.1-lp151.16.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151581" version="1" comment="gdm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606750" version="1" comment="gdm-branding-upstream is &lt;3.26.2.1-lp151.16.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235241" version="1" comment="gdm-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606751" version="1" comment="gdm-devel is &lt;3.26.2.1-lp151.16.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009235242" version="1" comment="gdm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606752" version="1" comment="gdm-lang is &lt;3.26.2.1-lp151.16.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151582" version="1" comment="gdm-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606753" version="1" comment="gdmflexiserver is &lt;3.26.2.1-lp151.16.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151583" version="1" comment="gdmflexiserver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606754" version="1" comment="libgdm1 is &lt;3.26.2.1-lp151.16.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151584" version="1" comment="libgdm1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606755" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.26.2.1-lp151.16.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151585" version="1" comment="typelib-1_0-Gdm-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606916" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-lp151.4.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606917" version="1" comment="libIlmImf-2_2-23-32bit is &lt;2.2.1-lp151.4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606918" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-lp151.4.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606919" version="1" comment="libIlmImfUtil-2_2-23-32bit is &lt;2.2.1-lp151.4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606920" version="1" comment="openexr is &lt;2.2.1-lp151.4.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606921" version="1" comment="openexr-devel is &lt;2.2.1-lp151.4.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606922" version="1" comment="openexr-doc is &lt;2.2.1-lp151.4.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604591" version="1" comment="go1.13 is &lt;1.13.15-lp151.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604592" version="1" comment="go1.13-doc is &lt;1.13.15-lp151.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604593" version="1" comment="go1.13-race is &lt;1.13.15-lp151.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606027" version="1" comment="python2-salt is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606028" version="1" comment="python3-salt is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606029" version="1" comment="salt is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606030" version="1" comment="salt-api is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606031" version="1" comment="salt-bash-completion is &lt;3000-lp151.5.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606032" version="1" comment="salt-cloud is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606033" version="1" comment="salt-doc is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606034" version="1" comment="salt-fish-completion is &lt;3000-lp151.5.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606035" version="1" comment="salt-master is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606036" version="1" comment="salt-minion is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606037" version="1" comment="salt-proxy is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606038" version="1" comment="salt-ssh is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606039" version="1" comment="salt-standalone-formulas-configuration is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606040" version="1" comment="salt-syndic is &lt;3000-lp151.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606041" version="1" comment="salt-zsh-completion is &lt;3000-lp151.5.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606042" version="1" comment="ceph is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606043" version="1" comment="ceph-base is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606044" version="1" comment="ceph-common is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606045" version="1" comment="ceph-dashboard-e2e is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606046" version="1" comment="ceph-fuse is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606047" version="1" comment="ceph-grafana-dashboards is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606048" version="1" comment="ceph-mds is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606049" version="1" comment="ceph-mgr is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606050" version="1" comment="ceph-mgr-dashboard is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606051" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606052" version="1" comment="ceph-mgr-diskprediction-local is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606053" version="1" comment="ceph-mgr-k8sevents is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606054" version="1" comment="ceph-mgr-rook is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606055" version="1" comment="ceph-mgr-ssh is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606056" version="1" comment="ceph-mon is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606057" version="1" comment="ceph-osd is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606058" version="1" comment="ceph-prometheus-alerts is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606059" version="1" comment="ceph-radosgw is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606060" version="1" comment="ceph-resource-agents is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606061" version="1" comment="ceph-test is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606062" version="1" comment="cephfs-shell is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606063" version="1" comment="libcephfs-devel is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606064" version="1" comment="libcephfs2 is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606065" version="1" comment="librados-devel is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606066" version="1" comment="librados2 is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606067" version="1" comment="libradospp-devel is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606068" version="1" comment="libradosstriper-devel is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606069" version="1" comment="libradosstriper1 is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606070" version="1" comment="librbd-devel is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606071" version="1" comment="librbd1 is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606072" version="1" comment="librgw-devel is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606073" version="1" comment="librgw2 is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606074" version="1" comment="python3-ceph-argparse is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606075" version="1" comment="python3-cephfs is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606076" version="1" comment="python3-rados is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606077" version="1" comment="python3-rbd is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606078" version="1" comment="python3-rgw is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606079" version="1" comment="rados-objclass-devel is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606080" version="1" comment="rbd-fuse is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606081" version="1" comment="rbd-mirror is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606082" version="1" comment="rbd-nbd is &lt;14.2.5.382+g8881d33957-lp151.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609883" version="1" comment="libsystemd0 is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609884" version="1" comment="libsystemd0-32bit is &lt;234-lp151.26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609885" version="1" comment="libsystemd0-mini is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609886" version="1" comment="libudev-devel is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609887" version="1" comment="libudev-devel-32bit is &lt;234-lp151.26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609888" version="1" comment="libudev-mini-devel is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609889" version="1" comment="libudev-mini1 is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609890" version="1" comment="libudev1 is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609891" version="1" comment="libudev1-32bit is &lt;234-lp151.26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609892" version="1" comment="nss-myhostname is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609893" version="1" comment="nss-myhostname-32bit is &lt;234-lp151.26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609894" version="1" comment="nss-mymachines is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609895" version="1" comment="nss-mymachines-32bit is &lt;234-lp151.26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609896" version="1" comment="nss-systemd is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609897" version="1" comment="systemd is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609898" version="1" comment="systemd-32bit is &lt;234-lp151.26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609899" version="1" comment="systemd-bash-completion is &lt;234-lp151.26.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609900" version="1" comment="systemd-container is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609901" version="1" comment="systemd-coredump is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609902" version="1" comment="systemd-devel is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609903" version="1" comment="systemd-logger is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609904" version="1" comment="systemd-mini is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609905" version="1" comment="systemd-mini-bash-completion is &lt;234-lp151.26.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609906" version="1" comment="systemd-mini-container-mini is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609907" version="1" comment="systemd-mini-coredump-mini is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609908" version="1" comment="systemd-mini-devel is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609909" version="1" comment="systemd-mini-sysvinit is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609910" version="1" comment="systemd-sysvinit is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609911" version="1" comment="udev is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609912" version="1" comment="udev-mini is &lt;234-lp151.26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607026" version="1" comment="libecpg6-32bit is &lt;10.12-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607028" version="1" comment="libpq5-32bit is &lt;10.12-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605421" version="1" comment="conmon is &lt;2.0.20-lp151.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605422" version="1" comment="fuse-overlayfs is &lt;1.1.2-lp151.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605423" version="1" comment="libcontainers-common is &lt;20200727-lp151.2.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605424" version="1" comment="podman is &lt;2.0.6-lp151.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605425" version="1" comment="podman-cni-config is &lt;2.0.6-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607517" version="1" comment="libssh-devel is &lt;0.8.7-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607518" version="1" comment="libssh4 is &lt;0.8.7-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607519" version="1" comment="libssh4-32bit is &lt;0.8.7-lp151.2.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607866" version="1" comment="python2-PyYAML is &lt;5.1.2-lp151.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281491" version="1" comment="python2-PyYAML is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607867" version="1" comment="python3-PyYAML is &lt;5.1.2-lp151.2.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281492" version="1" comment="python3-PyYAML is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609913" version="1" comment="pdns is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609914" version="1" comment="pdns-backend-geoip is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609915" version="1" comment="pdns-backend-godbc is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609916" version="1" comment="pdns-backend-ldap is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609917" version="1" comment="pdns-backend-lua is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609918" version="1" comment="pdns-backend-mydns is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609919" version="1" comment="pdns-backend-mysql is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609920" version="1" comment="pdns-backend-postgresql is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609921" version="1" comment="pdns-backend-remote is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609922" version="1" comment="pdns-backend-sqlite3 is &lt;4.1.8-lp151.2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606098" version="1" comment="libwireshark13 is &lt;3.2.7-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606099" version="1" comment="libwiretap10 is &lt;3.2.7-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606100" version="1" comment="libwsutil11 is &lt;3.2.7-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606101" version="1" comment="wireshark is &lt;3.2.7-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606102" version="1" comment="wireshark-devel is &lt;3.2.7-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606103" version="1" comment="wireshark-ui-qt is &lt;3.2.7-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605432" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605433" version="1" comment="libQt5Concurrent-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605434" version="1" comment="libQt5Concurrent5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605435" version="1" comment="libQt5Core-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605436" version="1" comment="libQt5Core-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605437" version="1" comment="libQt5Core5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605438" version="1" comment="libQt5DBus-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605439" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605440" version="1" comment="libQt5DBus5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605441" version="1" comment="libQt5Gui-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605442" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605443" version="1" comment="libQt5Gui5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605444" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605445" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605446" version="1" comment="libQt5Network-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605447" version="1" comment="libQt5Network-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605448" version="1" comment="libQt5Network5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605449" version="1" comment="libQt5OpenGL-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605450" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605451" version="1" comment="libQt5OpenGL5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605452" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605453" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605454" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605455" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605456" version="1" comment="libQt5PrintSupport-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605457" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605458" version="1" comment="libQt5PrintSupport5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605459" version="1" comment="libQt5Sql-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605460" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605461" version="1" comment="libQt5Sql5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605462" version="1" comment="libQt5Sql5-mysql is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605463" version="1" comment="libQt5Sql5-postgresql is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605464" version="1" comment="libQt5Sql5-sqlite is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605465" version="1" comment="libQt5Sql5-unixODBC is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605466" version="1" comment="libQt5Test-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605467" version="1" comment="libQt5Test-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605468" version="1" comment="libQt5Test5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605469" version="1" comment="libQt5Widgets-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605470" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605471" version="1" comment="libQt5Widgets5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605472" version="1" comment="libQt5Xml-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605473" version="1" comment="libQt5Xml5 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605474" version="1" comment="libqt5-qtbase-common-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605475" version="1" comment="libqt5-qtbase-devel is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605476" version="1" comment="libqt5-qtbase-examples is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605477" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.9.7-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605478" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.9.7-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607364" version="1" comment="glibc is &lt;2.26-lp151.19.11.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607365" version="1" comment="glibc-32bit is &lt;2.26-lp151.19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607366" version="1" comment="glibc-devel is &lt;2.26-lp151.19.11.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607367" version="1" comment="glibc-devel-32bit is &lt;2.26-lp151.19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607368" version="1" comment="glibc-devel-static is &lt;2.26-lp151.19.11.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607369" version="1" comment="glibc-devel-static-32bit is &lt;2.26-lp151.19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607370" version="1" comment="glibc-extra is &lt;2.26-lp151.19.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607371" version="1" comment="glibc-html is &lt;2.26-lp151.19.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607372" version="1" comment="glibc-i18ndata is &lt;2.26-lp151.19.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607373" version="1" comment="glibc-info is &lt;2.26-lp151.19.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607374" version="1" comment="glibc-locale is &lt;2.26-lp151.19.11.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607375" version="1" comment="glibc-locale-base is &lt;2.26-lp151.19.11.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607376" version="1" comment="glibc-locale-base-32bit is &lt;2.26-lp151.19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607377" version="1" comment="glibc-profile is &lt;2.26-lp151.19.11.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607378" version="1" comment="glibc-profile-32bit is &lt;2.26-lp151.19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607379" version="1" comment="glibc-utils is &lt;2.26-lp151.19.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607380" version="1" comment="glibc-utils-32bit is &lt;2.26-lp151.19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607381" version="1" comment="nscd is &lt;2.26-lp151.19.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609598" version="1" comment="tomcat is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609599" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609600" version="1" comment="tomcat-docs-webapp is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609601" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609602" version="1" comment="tomcat-embed is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609603" version="1" comment="tomcat-javadoc is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609604" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609605" version="1" comment="tomcat-jsvc is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609606" version="1" comment="tomcat-lib is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609607" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609608" version="1" comment="tomcat-webapps is &lt;9.0.36-lp151.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607436" version="1" comment="ceph is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607437" version="1" comment="ceph-base is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607438" version="1" comment="ceph-common is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607439" version="1" comment="ceph-dashboard-e2e is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607440" version="1" comment="ceph-fuse is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607441" version="1" comment="ceph-grafana-dashboards is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607442" version="1" comment="ceph-mds is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607443" version="1" comment="ceph-mgr is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607444" version="1" comment="ceph-mgr-dashboard is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607445" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607446" version="1" comment="ceph-mgr-diskprediction-local is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607447" version="1" comment="ceph-mgr-k8sevents is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607448" version="1" comment="ceph-mgr-rook is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607449" version="1" comment="ceph-mgr-ssh is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607450" version="1" comment="ceph-mon is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607451" version="1" comment="ceph-osd is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607452" version="1" comment="ceph-prometheus-alerts is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607453" version="1" comment="ceph-radosgw is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607454" version="1" comment="ceph-resource-agents is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607455" version="1" comment="ceph-test is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607456" version="1" comment="cephfs-shell is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607457" version="1" comment="libcephfs-devel is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607458" version="1" comment="libcephfs2 is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607459" version="1" comment="librados-devel is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607460" version="1" comment="librados2 is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607461" version="1" comment="libradospp-devel is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607462" version="1" comment="libradosstriper-devel is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607463" version="1" comment="libradosstriper1 is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607464" version="1" comment="librbd-devel is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607465" version="1" comment="librbd1 is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607466" version="1" comment="librgw-devel is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607467" version="1" comment="librgw2 is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607468" version="1" comment="python3-ceph-argparse is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607469" version="1" comment="python3-cephfs is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607470" version="1" comment="python3-rados is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607471" version="1" comment="python3-rbd is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607472" version="1" comment="python3-rgw is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607473" version="1" comment="rados-objclass-devel is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607474" version="1" comment="rbd-fuse is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607475" version="1" comment="rbd-mirror is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607476" version="1" comment="rbd-nbd is &lt;14.2.5.389+gb0f23ac248-lp151.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607684" version="1" comment="apache2 is &lt;2.4.33-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607685" version="1" comment="apache2-devel is &lt;2.4.33-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607686" version="1" comment="apache2-doc is &lt;2.4.33-lp151.8.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607687" version="1" comment="apache2-event is &lt;2.4.33-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607688" version="1" comment="apache2-example-pages is &lt;2.4.33-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607689" version="1" comment="apache2-prefork is &lt;2.4.33-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607690" version="1" comment="apache2-utils is &lt;2.4.33-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607691" version="1" comment="apache2-worker is &lt;2.4.33-lp151.8.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609440" version="1" comment="ImageMagick is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609441" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609442" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609443" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609444" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp151.7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609445" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp151.7.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609446" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609447" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609448" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp151.7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609449" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609450" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp151.7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609451" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609452" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609453" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609454" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609455" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp151.7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609172" version="1" comment="cargo is &lt;1.43.1-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609173" version="1" comment="cargo-doc is &lt;1.43.1-lp151.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609174" version="1" comment="clippy is &lt;1.43.1-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609175" version="1" comment="rls is &lt;1.43.1-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609176" version="1" comment="rust is &lt;1.43.1-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609177" version="1" comment="rust-analysis is &lt;1.43.1-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609178" version="1" comment="rust-cbindgen is &lt;0.14.1-lp151.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609179" version="1" comment="rust-doc is &lt;1.43.1-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609180" version="1" comment="rust-gdb is &lt;1.43.1-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609181" version="1" comment="rust-src is &lt;1.43.1-lp151.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609182" version="1" comment="rust-std-static is &lt;1.43.1-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609183" version="1" comment="rustfmt is &lt;1.43.1-lp151.5.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606760" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-lp151.5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606761" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-lp151.5.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606733" version="1" comment="libopenssl-1_1-devel is &lt;1.1.0i-lp151.8.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606734" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.0i-lp151.8.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606762" version="1" comment="libopenssl10 is &lt;1.0.2p-lp151.5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338634" version="1" comment="libopenssl10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606763" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-lp151.5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606764" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-lp151.5.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606765" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-lp151.5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606766" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-lp151.5.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606767" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-lp151.5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606768" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-lp151.5.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606735" version="1" comment="libopenssl1_1 is &lt;1.1.0i-lp151.8.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606736" version="1" comment="libopenssl1_1-32bit is &lt;1.1.0i-lp151.8.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606737" version="1" comment="libopenssl1_1-hmac is &lt;1.1.0i-lp151.8.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606738" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.0i-lp151.8.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609609" version="1" comment="nodejs10 is &lt;10.23.1-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609610" version="1" comment="nodejs10-devel is &lt;10.23.1-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609611" version="1" comment="nodejs10-docs is &lt;10.23.1-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609612" version="1" comment="npm10 is &lt;10.23.1-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606769" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-lp151.5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606770" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-lp151.5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606771" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-lp151.5.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606739" version="1" comment="openssl-1_1 is &lt;1.1.0i-lp151.8.12.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606740" version="1" comment="openssl-1_1-doc is &lt;1.1.0i-lp151.8.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608217" version="1" comment="qemu is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608218" version="1" comment="qemu-arm is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608219" version="1" comment="qemu-audio-alsa is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608220" version="1" comment="qemu-audio-oss is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608221" version="1" comment="qemu-audio-pa is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608222" version="1" comment="qemu-audio-sdl is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608223" version="1" comment="qemu-block-curl is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608224" version="1" comment="qemu-block-dmg is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608225" version="1" comment="qemu-block-gluster is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608226" version="1" comment="qemu-block-iscsi is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608227" version="1" comment="qemu-block-nfs is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608228" version="1" comment="qemu-block-rbd is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608229" version="1" comment="qemu-block-ssh is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608230" version="1" comment="qemu-extra is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608231" version="1" comment="qemu-guest-agent is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608232" version="1" comment="qemu-ipxe is &lt;1.0.0+-lp151.7.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608233" version="1" comment="qemu-ksm is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608234" version="1" comment="qemu-kvm is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608235" version="1" comment="qemu-lang is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608236" version="1" comment="qemu-linux-user is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608237" version="1" comment="qemu-ppc is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608238" version="1" comment="qemu-s390 is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608239" version="1" comment="qemu-seabios is &lt;1.12.0-lp151.7.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608240" version="1" comment="qemu-sgabios is &lt;8-lp151.7.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608241" version="1" comment="qemu-tools is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608242" version="1" comment="qemu-ui-curses is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608243" version="1" comment="qemu-ui-gtk is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608244" version="1" comment="qemu-ui-sdl is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608245" version="1" comment="qemu-vgabios is &lt;1.12.0-lp151.7.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608246" version="1" comment="qemu-x86 is &lt;3.1.1.1-lp151.7.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607871" version="1" comment="slirp4netns is &lt;0.4.5-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609923" version="1" comment="icingacli is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609924" version="1" comment="icingaweb2 is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609925" version="1" comment="icingaweb2-common is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609926" version="1" comment="icingaweb2-vendor-HTMLPurifier is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609927" version="1" comment="icingaweb2-vendor-JShrink is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609928" version="1" comment="icingaweb2-vendor-Parsedown is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609929" version="1" comment="icingaweb2-vendor-dompdf is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609930" version="1" comment="icingaweb2-vendor-lessphp is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609931" version="1" comment="icingaweb2-vendor-zf1 is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609932" version="1" comment="php-Icinga is &lt;2.7.4-lp151.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605482" version="1" comment="go1.14 is &lt;1.14.9-lp151.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605483" version="1" comment="go1.14-doc is &lt;1.14.9-lp151.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605484" version="1" comment="go1.14-race is &lt;1.14.9-lp151.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609933" version="1" comment="fossil is &lt;2.12.1-lp151.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168274" version="1" comment="fossil is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609934" version="1" comment="ark is &lt;18.12.3-lp151.2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609935" version="1" comment="ark-lang is &lt;18.12.3-lp151.2.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609936" version="1" comment="libkerfuffle18 is &lt;18.12.3-lp151.2.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605697" version="1" comment="gnutls is &lt;3.6.7-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605698" version="1" comment="gnutls-guile is &lt;3.6.7-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605699" version="1" comment="libgnutls-dane-devel is &lt;3.6.7-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605700" version="1" comment="libgnutls-dane0 is &lt;3.6.7-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605701" version="1" comment="libgnutls-devel is &lt;3.6.7-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605702" version="1" comment="libgnutls-devel-32bit is &lt;3.6.7-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605703" version="1" comment="libgnutls30 is &lt;3.6.7-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605704" version="1" comment="libgnutls30-32bit is &lt;3.6.7-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605705" version="1" comment="libgnutls30-hmac is &lt;3.6.7-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605706" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605707" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605708" version="1" comment="libgnutlsxx28 is &lt;3.6.7-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605695" version="1" comment="kleopatra is &lt;18.12.3-lp151.2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296734" version="1" comment="kleopatra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605696" version="1" comment="kleopatra-lang is &lt;18.12.3-lp151.2.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009296735" version="1" comment="kleopatra-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605250" version="1" comment="libxml2-2 is &lt;2.9.7-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605251" version="1" comment="libxml2-2-32bit is &lt;2.9.7-lp151.5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605252" version="1" comment="libxml2-devel is &lt;2.9.7-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605253" version="1" comment="libxml2-devel-32bit is &lt;2.9.7-lp151.5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605254" version="1" comment="libxml2-doc is &lt;2.9.7-lp151.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605255" version="1" comment="libxml2-tools is &lt;2.9.7-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605256" version="1" comment="python2-libxml2-python is &lt;2.9.7-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605257" version="1" comment="python3-libxml2-python is &lt;2.9.7-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609937" version="1" comment="python2-Flask-Cors is &lt;3.0.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009292844" version="1" comment="python2-Flask-Cors is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609938" version="1" comment="python3-Flask-Cors is &lt;3.0.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009292846" version="1" comment="python3-Flask-Cors is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609939" version="1" comment="singularity is &lt;3.6.3-lp151.2.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605545" version="1" comment="libproxy-devel is &lt;0.4.15-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151761" version="1" comment="libproxy-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605546" version="1" comment="libproxy-sharp is &lt;0.4.15-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295954" version="1" comment="libproxy-sharp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605547" version="1" comment="libproxy-tools is &lt;0.4.15-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295955" version="1" comment="libproxy-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605548" version="1" comment="libproxy1 is &lt;0.4.15-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151762" version="1" comment="libproxy1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605549" version="1" comment="libproxy1-32bit is &lt;0.4.15-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295956" version="1" comment="libproxy1-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605550" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.15-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151763" version="1" comment="libproxy1-config-gnome3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605551" version="1" comment="libproxy1-config-kde is &lt;0.4.15-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154112" version="1" comment="libproxy1-config-kde is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605552" version="1" comment="libproxy1-networkmanager is &lt;0.4.15-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151765" version="1" comment="libproxy1-networkmanager is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605553" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.15-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151766" version="1" comment="libproxy1-pacrunner-webkit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605554" version="1" comment="perl-Net-Libproxy is &lt;0.4.15-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295957" version="1" comment="perl-Net-Libproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605555" version="1" comment="python-libproxy is &lt;0.4.15-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295958" version="1" comment="python-libproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605556" version="1" comment="python3-libproxy is &lt;0.4.15-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295959" version="1" comment="python3-libproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605972" version="1" comment="libpacemaker-devel is &lt;2.0.1+20190417.13d370ca9-lp151.2.16.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153792" version="1" comment="libpacemaker-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605973" version="1" comment="libpacemaker3 is &lt;2.0.1+20190417.13d370ca9-lp151.2.16.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153793" version="1" comment="libpacemaker3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605974" version="1" comment="pacemaker is &lt;2.0.1+20190417.13d370ca9-lp151.2.16.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153794" version="1" comment="pacemaker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605975" version="1" comment="pacemaker-cli is &lt;2.0.1+20190417.13d370ca9-lp151.2.16.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153795" version="1" comment="pacemaker-cli is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605976" version="1" comment="pacemaker-cts is &lt;2.0.1+20190417.13d370ca9-lp151.2.16.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153796" version="1" comment="pacemaker-cts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605977" version="1" comment="pacemaker-remote is &lt;2.0.1+20190417.13d370ca9-lp151.2.16.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153797" version="1" comment="pacemaker-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606349" version="1" comment="ceph is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606350" version="1" comment="ceph-base is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606351" version="1" comment="ceph-common is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606352" version="1" comment="ceph-dashboard-e2e is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606353" version="1" comment="ceph-fuse is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606354" version="1" comment="ceph-grafana-dashboards is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606355" version="1" comment="ceph-mds is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606356" version="1" comment="ceph-mgr is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606357" version="1" comment="ceph-mgr-dashboard is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606358" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606359" version="1" comment="ceph-mgr-diskprediction-local is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606360" version="1" comment="ceph-mgr-k8sevents is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606361" version="1" comment="ceph-mgr-rook is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606362" version="1" comment="ceph-mgr-ssh is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606363" version="1" comment="ceph-mon is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606364" version="1" comment="ceph-osd is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606365" version="1" comment="ceph-prometheus-alerts is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606366" version="1" comment="ceph-radosgw is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606367" version="1" comment="ceph-resource-agents is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606368" version="1" comment="ceph-test is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606369" version="1" comment="cephfs-shell is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606370" version="1" comment="libcephfs-devel is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606371" version="1" comment="libcephfs2 is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606372" version="1" comment="librados-devel is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606373" version="1" comment="librados2 is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606374" version="1" comment="libradospp-devel is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606375" version="1" comment="libradosstriper-devel is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606376" version="1" comment="libradosstriper1 is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606377" version="1" comment="librbd-devel is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606378" version="1" comment="librbd1 is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606379" version="1" comment="librgw-devel is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606380" version="1" comment="librgw2 is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606381" version="1" comment="python3-ceph-argparse is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606382" version="1" comment="python3-cephfs is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606383" version="1" comment="python3-rados is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606384" version="1" comment="python3-rbd is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606385" version="1" comment="python3-rgw is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606386" version="1" comment="rados-objclass-devel is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606387" version="1" comment="rbd-fuse is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606388" version="1" comment="rbd-mirror is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606389" version="1" comment="rbd-nbd is &lt;14.2.13.450+g65ea1b614d-lp151.2.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606291" version="1" comment="kernel-debug is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606292" version="1" comment="kernel-debug-base is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606293" version="1" comment="kernel-debug-devel is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606294" version="1" comment="kernel-default is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606295" version="1" comment="kernel-default-base is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606296" version="1" comment="kernel-default-devel is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606297" version="1" comment="kernel-devel is &lt;4.12.14-lp151.28.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606298" version="1" comment="kernel-docs is &lt;4.12.14-lp151.28.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606299" version="1" comment="kernel-docs-html is &lt;4.12.14-lp151.28.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606300" version="1" comment="kernel-kvmsmall is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606301" version="1" comment="kernel-kvmsmall-base is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606302" version="1" comment="kernel-kvmsmall-devel is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606303" version="1" comment="kernel-macros is &lt;4.12.14-lp151.28.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606304" version="1" comment="kernel-obs-build is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606305" version="1" comment="kernel-obs-qa is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606306" version="1" comment="kernel-source is &lt;4.12.14-lp151.28.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606307" version="1" comment="kernel-source-vanilla is &lt;4.12.14-lp151.28.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606308" version="1" comment="kernel-syms is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606309" version="1" comment="kernel-vanilla is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606310" version="1" comment="kernel-vanilla-base is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606311" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-lp151.28.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609434" version="1" comment="dnsmasq is &lt;2.78-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609435" version="1" comment="dnsmasq-utils is &lt;2.78-lp151.5.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606512" version="1" comment="fontforge is &lt;20170731-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276598" version="1" comment="fontforge is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606513" version="1" comment="fontforge-devel is &lt;20170731-lp151.4.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276599" version="1" comment="fontforge-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606514" version="1" comment="fontforge-doc is &lt;20170731-lp151.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276600" version="1" comment="fontforge-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606139" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606140" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp151.10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606141" version="1" comment="libldap-data is &lt;2.4.46-lp151.10.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606142" version="1" comment="openldap2 is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606143" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606144" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606145" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606146" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606147" version="1" comment="openldap2-client is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606148" version="1" comment="openldap2-contrib is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606149" version="1" comment="openldap2-devel is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606150" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp151.10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606151" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606152" version="1" comment="openldap2-doc is &lt;2.4.46-lp151.10.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606153" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp151.10.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606239" version="1" comment="libecpg6 is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606240" version="1" comment="libpq5 is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606230" version="1" comment="postgresql10 is &lt;10.15-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606231" version="1" comment="postgresql10-contrib is &lt;10.15-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606232" version="1" comment="postgresql10-devel is &lt;10.15-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606233" version="1" comment="postgresql10-docs is &lt;10.15-lp151.2.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606234" version="1" comment="postgresql10-plperl is &lt;10.15-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606235" version="1" comment="postgresql10-plpython is &lt;10.15-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606236" version="1" comment="postgresql10-pltcl is &lt;10.15-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606237" version="1" comment="postgresql10-server is &lt;10.15-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606238" version="1" comment="postgresql10-test is &lt;10.15-lp151.2.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606241" version="1" comment="postgresql12 is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606242" version="1" comment="postgresql12-contrib is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606243" version="1" comment="postgresql12-devel is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606244" version="1" comment="postgresql12-docs is &lt;12.5-lp151.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606245" version="1" comment="postgresql12-llvmjit is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606246" version="1" comment="postgresql12-plperl is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606247" version="1" comment="postgresql12-plpython is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606248" version="1" comment="postgresql12-pltcl is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606249" version="1" comment="postgresql12-server is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606250" version="1" comment="postgresql12-server-devel is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606251" version="1" comment="postgresql12-test is &lt;12.5-lp151.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606499" version="1" comment="LibVNCServer-devel is &lt;0.9.10-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606500" version="1" comment="libvncclient0 is &lt;0.9.10-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606501" version="1" comment="libvncserver0 is &lt;0.9.10-lp151.7.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609413" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609414" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp151.10.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609415" version="1" comment="libldap-data is &lt;2.4.46-lp151.10.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609416" version="1" comment="openldap2 is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609417" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609418" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609419" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609420" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609421" version="1" comment="openldap2-client is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609422" version="1" comment="openldap2-contrib is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609423" version="1" comment="openldap2-devel is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609424" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp151.10.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609425" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609426" version="1" comment="openldap2-doc is &lt;2.4.46-lp151.10.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609427" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp151.10.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604468" version="1" comment="java-11-openjdk is &lt;11.0.6.0-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604469" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.6.0-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604470" version="1" comment="java-11-openjdk-demo is &lt;11.0.6.0-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604471" version="1" comment="java-11-openjdk-devel is &lt;11.0.6.0-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604472" version="1" comment="java-11-openjdk-headless is &lt;11.0.6.0-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604473" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.6.0-lp151.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604474" version="1" comment="java-11-openjdk-jmods is &lt;11.0.6.0-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604475" version="1" comment="java-11-openjdk-src is &lt;11.0.6.0-lp151.3.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605277" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605278" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.242-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605279" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605280" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605281" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605282" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.242-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605283" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.242-lp151.2.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606012" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606013" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-lp151.10.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606014" version="1" comment="python is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606015" version="1" comment="python-32bit is &lt;2.7.17-lp151.10.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606016" version="1" comment="python-base is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606017" version="1" comment="python-base-32bit is &lt;2.7.17-lp151.10.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606018" version="1" comment="python-curses is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606019" version="1" comment="python-demo is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606020" version="1" comment="python-devel is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606021" version="1" comment="python-doc is &lt;2.7.17-lp151.10.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606022" version="1" comment="python-doc-pdf is &lt;2.7.17-lp151.10.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606023" version="1" comment="python-gdbm is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606024" version="1" comment="python-idle is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606025" version="1" comment="python-tk is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606026" version="1" comment="python-xml is &lt;2.7.17-lp151.10.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605983" version="1" comment="libXvnc-devel is &lt;1.9.0-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605984" version="1" comment="libXvnc1 is &lt;1.9.0-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605985" version="1" comment="tigervnc is &lt;1.9.0-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605986" version="1" comment="tigervnc-x11vnc is &lt;1.9.0-lp151.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605987" version="1" comment="xorg-x11-Xvnc is &lt;1.9.0-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605988" version="1" comment="xorg-x11-Xvnc-java is &lt;1.9.0-lp151.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605989" version="1" comment="xorg-x11-Xvnc-module is &lt;1.9.0-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605990" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.9.0-lp151.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606772" version="1" comment="python2-urllib3 is &lt;1.24-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606773" version="1" comment="python2-urllib3-test is &lt;1.24-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606774" version="1" comment="python3-urllib3 is &lt;1.24-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606775" version="1" comment="python3-urllib3-test is &lt;1.24-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609940" version="1" comment="kdeconnect-kde is &lt;1.3.3-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295059" version="1" comment="kdeconnect-kde is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609941" version="1" comment="kdeconnect-kde-lang is &lt;1.3.3-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295061" version="1" comment="kdeconnect-kde-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609550" version="1" comment="python-jupyter_notebook-doc is &lt;5.7.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341932" version="1" comment="python-jupyter_notebook-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609551" version="1" comment="python2-jupyter_notebook is &lt;5.7.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341933" version="1" comment="python2-jupyter_notebook is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609552" version="1" comment="python2-jupyter_notebook-lang is &lt;5.7.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341934" version="1" comment="python2-jupyter_notebook-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609553" version="1" comment="python2-jupyter_notebook-latex is &lt;5.7.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341935" version="1" comment="python2-jupyter_notebook-latex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609554" version="1" comment="python3-jupyter_notebook is &lt;5.7.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341936" version="1" comment="python3-jupyter_notebook is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609555" version="1" comment="python3-jupyter_notebook-lang is &lt;5.7.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341937" version="1" comment="python3-jupyter_notebook-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609556" version="1" comment="python3-jupyter_notebook-latex is &lt;5.7.7-lp151.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341938" version="1" comment="python3-jupyter_notebook-latex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606506" version="1" comment="libwireshark13 is &lt;3.2.8-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606507" version="1" comment="libwiretap10 is &lt;3.2.8-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606508" version="1" comment="libwsutil11 is &lt;3.2.8-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606509" version="1" comment="wireshark is &lt;3.2.8-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606510" version="1" comment="wireshark-devel is &lt;3.2.8-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606511" version="1" comment="wireshark-ui-qt is &lt;3.2.8-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606133" version="1" comment="MozillaFirefox is &lt;78.4.1-lp151.2.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606134" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.4.1-lp151.2.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606135" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.4.1-lp151.2.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606136" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-lp151.2.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606137" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-lp151.2.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606138" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.1-lp151.2.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606619" version="1" comment="MozillaThunderbird is &lt;78.4.2-lp151.2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606620" version="1" comment="MozillaThunderbird-translations-common is &lt;78.4.2-lp151.2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606621" version="1" comment="MozillaThunderbird-translations-other is &lt;78.4.2-lp151.2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609478" version="1" comment="MozillaFirefox is &lt;78.7.0-lp151.2.88.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609479" version="1" comment="MozillaFirefox-branding-upstream is &lt;78.7.0-lp151.2.88.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609480" version="1" comment="MozillaFirefox-buildsymbols is &lt;78.7.0-lp151.2.88.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609481" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-lp151.2.88.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609482" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-lp151.2.88.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609483" version="1" comment="MozillaFirefox-translations-other is &lt;78.7.0-lp151.2.88.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606090" version="1" comment="bluez is &lt;5.48-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606091" version="1" comment="bluez-auto-enable-devices is &lt;5.48-lp151.8.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606092" version="1" comment="bluez-cups is &lt;5.48-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606093" version="1" comment="bluez-devel is &lt;5.48-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606094" version="1" comment="bluez-devel-32bit is &lt;5.48-lp151.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606095" version="1" comment="bluez-test is &lt;5.48-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606096" version="1" comment="libbluetooth3 is &lt;5.48-lp151.8.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606097" version="1" comment="libbluetooth3-32bit is &lt;5.48-lp151.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609145" version="1" comment="python3-virtualbox is &lt;6.0.22-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609146" version="1" comment="virtualbox is &lt;6.0.22-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609147" version="1" comment="virtualbox-devel is &lt;6.0.22-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609148" version="1" comment="virtualbox-guest-desktop-icons is &lt;6.0.22-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609149" version="1" comment="virtualbox-guest-source is &lt;6.0.22-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609150" version="1" comment="virtualbox-guest-tools is &lt;6.0.22-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609151" version="1" comment="virtualbox-guest-x11 is &lt;6.0.22-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609152" version="1" comment="virtualbox-host-source is &lt;6.0.22-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609153" version="1" comment="virtualbox-kmp-default is &lt;6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609154" version="1" comment="virtualbox-qt is &lt;6.0.22-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609155" version="1" comment="virtualbox-vnc is &lt;6.0.22-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609156" version="1" comment="virtualbox-websrv is &lt;6.0.22-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608247" version="1" comment="java-11-openjdk is &lt;11.0.7.0-lp151.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608248" version="1" comment="java-11-openjdk-accessibility is &lt;11.0.7.0-lp151.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608249" version="1" comment="java-11-openjdk-demo is &lt;11.0.7.0-lp151.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608250" version="1" comment="java-11-openjdk-devel is &lt;11.0.7.0-lp151.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608251" version="1" comment="java-11-openjdk-headless is &lt;11.0.7.0-lp151.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608252" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.7.0-lp151.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608253" version="1" comment="java-11-openjdk-jmods is &lt;11.0.7.0-lp151.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608254" version="1" comment="java-11-openjdk-src is &lt;11.0.7.0-lp151.3.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608541" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608542" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.252-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608543" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608544" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608545" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608546" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.252-lp151.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608547" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.252-lp151.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606156" version="1" comment="ImageMagick is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606157" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606158" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606159" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606160" version="1" comment="ImageMagick-devel-32bit is &lt;7.0.7.34-lp151.7.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606161" version="1" comment="ImageMagick-doc is &lt;7.0.7.34-lp151.7.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606162" version="1" comment="ImageMagick-extra is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606163" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606164" version="1" comment="libMagick++-7_Q16HDRI4-32bit is &lt;7.0.7.34-lp151.7.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606165" version="1" comment="libMagick++-devel is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606166" version="1" comment="libMagick++-devel-32bit is &lt;7.0.7.34-lp151.7.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606167" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606168" version="1" comment="libMagickCore-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606169" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606170" version="1" comment="libMagickWand-7_Q16HDRI6-32bit is &lt;7.0.7.34-lp151.7.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606171" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-lp151.7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606694" version="1" comment="xen is &lt;4.12.4_04-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606695" version="1" comment="xen-devel is &lt;4.12.4_04-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606696" version="1" comment="xen-doc-html is &lt;4.12.4_04-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606697" version="1" comment="xen-libs is &lt;4.12.4_04-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606698" version="1" comment="xen-libs-32bit is &lt;4.12.4_04-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606699" version="1" comment="xen-tools is &lt;4.12.4_04-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606700" version="1" comment="xen-tools-domU is &lt;4.12.4_04-lp151.2.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606003" version="1" comment="xen is &lt;4.12.3_10-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606004" version="1" comment="xen-devel is &lt;4.12.3_10-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606005" version="1" comment="xen-doc-html is &lt;4.12.3_10-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606006" version="1" comment="xen-libs is &lt;4.12.3_10-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606007" version="1" comment="xen-libs-32bit is &lt;4.12.3_10-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606008" version="1" comment="xen-tools is &lt;4.12.3_10-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606009" version="1" comment="xen-tools-domU is &lt;4.12.3_10-lp151.2.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606776" version="1" comment="libpmi0 is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606777" version="1" comment="libslurm33 is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606778" version="1" comment="perl-slurm is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606779" version="1" comment="slurm is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606780" version="1" comment="slurm-auth-none is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606781" version="1" comment="slurm-config is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606782" version="1" comment="slurm-config-man is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606783" version="1" comment="slurm-cray is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606784" version="1" comment="slurm-devel is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606785" version="1" comment="slurm-doc is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606786" version="1" comment="slurm-hdf5 is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606787" version="1" comment="slurm-lua is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606788" version="1" comment="slurm-munge is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606789" version="1" comment="slurm-node is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606790" version="1" comment="slurm-openlava is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606791" version="1" comment="slurm-pam_slurm is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606792" version="1" comment="slurm-plugins is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606793" version="1" comment="slurm-seff is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606794" version="1" comment="slurm-sjstat is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606795" version="1" comment="slurm-slurmdbd is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606796" version="1" comment="slurm-sql is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606797" version="1" comment="slurm-sview is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606798" version="1" comment="slurm-torque is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606799" version="1" comment="slurm-webdoc is &lt;18.08.9-lp151.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609557" version="1" comment="ceph is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609558" version="1" comment="ceph-base is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609559" version="1" comment="ceph-common is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609560" version="1" comment="ceph-dashboard-e2e is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609561" version="1" comment="ceph-fuse is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609562" version="1" comment="ceph-grafana-dashboards is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609563" version="1" comment="ceph-mds is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609564" version="1" comment="ceph-mgr is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609565" version="1" comment="ceph-mgr-dashboard is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609566" version="1" comment="ceph-mgr-diskprediction-cloud is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609567" version="1" comment="ceph-mgr-diskprediction-local is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609568" version="1" comment="ceph-mgr-k8sevents is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609569" version="1" comment="ceph-mgr-rook is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609570" version="1" comment="ceph-mgr-ssh is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609571" version="1" comment="ceph-mon is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609572" version="1" comment="ceph-osd is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609573" version="1" comment="ceph-prometheus-alerts is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609574" version="1" comment="ceph-radosgw is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609575" version="1" comment="ceph-resource-agents is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609576" version="1" comment="ceph-test is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609577" version="1" comment="cephfs-shell is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609578" version="1" comment="libcephfs-devel is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609579" version="1" comment="libcephfs2 is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609580" version="1" comment="librados-devel is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609581" version="1" comment="librados2 is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609582" version="1" comment="libradospp-devel is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609583" version="1" comment="libradosstriper-devel is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609584" version="1" comment="libradosstriper1 is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609585" version="1" comment="librbd-devel is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609586" version="1" comment="librbd1 is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609587" version="1" comment="librgw-devel is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609588" version="1" comment="librgw2 is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609589" version="1" comment="python3-ceph-argparse is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609590" version="1" comment="python3-cephfs is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609591" version="1" comment="python3-rados is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609592" version="1" comment="python3-rbd is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609593" version="1" comment="python3-rgw is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609594" version="1" comment="rados-objclass-devel is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609595" version="1" comment="rbd-fuse is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609596" version="1" comment="rbd-mirror is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609597" version="1" comment="rbd-nbd is &lt;14.2.16.402+g7d47dbaf4d-lp151.2.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606723" version="1" comment="pngcheck is &lt;2.3.0-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338019" version="1" comment="pngcheck is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609942" version="1" comment="sddm is &lt;0.18.0-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152215" version="1" comment="sddm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609943" version="1" comment="sddm-branding-openSUSE is &lt;0.18.0-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152216" version="1" comment="sddm-branding-openSUSE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609944" version="1" comment="sddm-branding-upstream is &lt;0.18.0-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231933" version="1" comment="sddm-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606315" version="1" comment="krb5 is &lt;1.16.3-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151005" version="1" comment="krb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606316" version="1" comment="krb5-32bit is &lt;1.16.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151006" version="1" comment="krb5-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606317" version="1" comment="krb5-client is &lt;1.16.3-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151007" version="1" comment="krb5-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606318" version="1" comment="krb5-devel is &lt;1.16.3-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151008" version="1" comment="krb5-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606319" version="1" comment="krb5-devel-32bit is &lt;1.16.3-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152677" version="1" comment="krb5-devel-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606320" version="1" comment="krb5-mini is &lt;1.16.3-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152679" version="1" comment="krb5-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606321" version="1" comment="krb5-mini-devel is &lt;1.16.3-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152680" version="1" comment="krb5-mini-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606322" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152681" version="1" comment="krb5-plugin-kdb-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606323" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152682" version="1" comment="krb5-plugin-preauth-otp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606324" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152683" version="1" comment="krb5-plugin-preauth-pkinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606325" version="1" comment="krb5-server is &lt;1.16.3-lp151.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152684" version="1" comment="krb5-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606336" version="1" comment="go1.14 is &lt;1.14.12-lp151.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606337" version="1" comment="go1.14-doc is &lt;1.14.12-lp151.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606338" version="1" comment="go1.14-race is &lt;1.14.12-lp151.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606521" version="1" comment="mutt is &lt;1.10.1-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606522" version="1" comment="mutt-doc is &lt;1.10.1-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606523" version="1" comment="mutt-lang is &lt;1.10.1-lp151.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606312" version="1" comment="rclone is &lt;1.53.3-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300204" version="1" comment="rclone is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606313" version="1" comment="rclone-bash-completion is &lt;1.53.3-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300205" version="1" comment="rclone-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606314" version="1" comment="rclone-zsh-completion is &lt;1.53.3-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300206" version="1" comment="rclone-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609945" version="1" comment="blosc-devel is &lt;1.20.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340461" version="1" comment="blosc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609946" version="1" comment="libblosc1 is &lt;1.20.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340463" version="1" comment="libblosc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606867" version="1" comment="xen is &lt;4.12.4_06-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606868" version="1" comment="xen-devel is &lt;4.12.4_06-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606869" version="1" comment="xen-doc-html is &lt;4.12.4_06-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606870" version="1" comment="xen-libs is &lt;4.12.4_06-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606871" version="1" comment="xen-libs-32bit is &lt;4.12.4_06-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606872" version="1" comment="xen-tools is &lt;4.12.4_06-lp151.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606873" version="1" comment="xen-tools-domU is &lt;4.12.4_06-lp151.2.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609439" version="1" comment="hawk2 is &lt;2.4.0+git.1611141202.2fe6369e-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341551" version="1" comment="hawk2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609514" version="1" comment="crmsh is &lt;4.2.0+git.1607075079.a25648d8-lp151.2.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341552" version="1" comment="crmsh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609515" version="1" comment="crmsh-scripts is &lt;4.2.0+git.1607075079.a25648d8-lp151.2.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341553" version="1" comment="crmsh-scripts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609516" version="1" comment="crmsh-test is &lt;4.2.0+git.1607075079.a25648d8-lp151.2.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341554" version="1" comment="crmsh-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609436" version="1" comment="python2-autobahn is &lt;17.10.1-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342290" version="1" comment="python2-autobahn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609437" version="1" comment="python3-autobahn is &lt;17.10.1-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342291" version="1" comment="python3-autobahn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607631" version="1" comment="cups is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607632" version="1" comment="cups-client is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607633" version="1" comment="cups-config is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607634" version="1" comment="cups-ddk is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607635" version="1" comment="cups-devel is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607636" version="1" comment="cups-devel-32bit is &lt;2.2.7-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607637" version="1" comment="libcups2 is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607638" version="1" comment="libcups2-32bit is &lt;2.2.7-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607639" version="1" comment="libcupscgi1 is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607640" version="1" comment="libcupscgi1-32bit is &lt;2.2.7-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607641" version="1" comment="libcupsimage2 is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607642" version="1" comment="libcupsimage2-32bit is &lt;2.2.7-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607643" version="1" comment="libcupsmime1 is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607644" version="1" comment="libcupsmime1-32bit is &lt;2.2.7-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607645" version="1" comment="libcupsppdc1 is &lt;2.2.7-lp151.6.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607646" version="1" comment="libcupsppdc1-32bit is &lt;2.2.7-lp151.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607936" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607937" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.28.2-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607938" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607939" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.28.2-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607940" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.2-lp151.2.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607941" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607942" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607943" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.2-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607944" version="1" comment="webkit-jsc-4 is &lt;2.28.2-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607945" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607946" version="1" comment="webkit2gtk3-devel is &lt;2.28.2-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607947" version="1" comment="webkit2gtk3-minibrowser is &lt;2.28.2-lp151.2.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609352" version="1" comment="libpainter0 is &lt;0.9.6-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287510" version="1" comment="libpainter0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609353" version="1" comment="librfxencode0 is &lt;0.9.6-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287511" version="1" comment="librfxencode0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609354" version="1" comment="xrdp is &lt;0.9.6-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287512" version="1" comment="xrdp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609355" version="1" comment="xrdp-devel is &lt;0.9.6-lp151.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287513" version="1" comment="xrdp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608050" version="1" comment="uftpd is &lt;2.11-lp151.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606939" version="1" comment="ipmitool is &lt;1.8.18-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009279130" version="1" comment="ipmitool is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606940" version="1" comment="ipmitool-bmc-snmp-proxy is &lt;1.8.18-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009279131" version="1" comment="ipmitool-bmc-snmp-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607862" version="1" comment="ruby2.5-rubygem-actionview-5_1 is &lt;5.1.4-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009282975" version="1" comment="ruby2.5-rubygem-actionview-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607863" version="1" comment="ruby2.5-rubygem-actionview-doc-5_1 is &lt;5.1.4-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009282976" version="1" comment="ruby2.5-rubygem-actionview-doc-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609613" version="1" comment="viewvc is &lt;1.1.28-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151738" version="1" comment="viewvc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609071" version="1" comment="fontforge is &lt;20170731-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609072" version="1" comment="fontforge-devel is &lt;20170731-lp151.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609073" version="1" comment="fontforge-doc is &lt;20170731-lp151.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609947" version="1" comment="gstreamer-rtsp-server-devel is &lt;1.12.5-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281635" version="1" comment="gstreamer-rtsp-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609948" version="1" comment="libgstrtspserver-1_0-0 is &lt;1.12.5-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281636" version="1" comment="libgstrtspserver-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609949" version="1" comment="typelib-1_0-GstRtspServer-1_0 is &lt;1.12.5-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281637" version="1" comment="typelib-1_0-GstRtspServer-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609950" version="1" comment="chromedriver is &lt;79.0.3945.130-lp151.2.60.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609951" version="1" comment="chromium is &lt;79.0.3945.130-lp151.2.60.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606957" version="1" comment="chromedriver is &lt;80.0.3987.122-lp151.2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606958" version="1" comment="chromium is &lt;80.0.3987.122-lp151.2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607023" version="1" comment="chromedriver is &lt;80.0.3987.132-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607024" version="1" comment="chromium is &lt;80.0.3987.132-lp151.2.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607525" version="1" comment="chromedriver is &lt;81.0.4044.92-lp151.2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607526" version="1" comment="chromium is &lt;81.0.4044.92-lp151.2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607545" version="1" comment="chromedriver is &lt;81.0.4044.113-lp151.2.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607546" version="1" comment="chromium is &lt;81.0.4044.113-lp151.2.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607870" version="1" comment="opera is &lt;68.0.3618.63-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608832" version="1" comment="chromedriver is &lt;83.0.4103.97-lp151.2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608833" version="1" comment="chromium is &lt;83.0.4103.97-lp151.2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607845" version="1" comment="chromedriver is &lt;81.0.4044.138-lp151.2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607846" version="1" comment="chromium is &lt;81.0.4044.138-lp151.2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608114" version="1" comment="opera is &lt;68.0.3618.104-lp151.2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608906" version="1" comment="chromedriver is &lt;83.0.4103.106-lp151.2.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608907" version="1" comment="chromium is &lt;83.0.4103.106-lp151.2.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609069" version="1" comment="chromedriver is &lt;83.0.4103.116-lp151.2.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609070" version="1" comment="chromium is &lt;83.0.4103.116-lp151.2.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609189" version="1" comment="opera is &lt;69.0.3686.49-lp151.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604364" version="1" comment="chromedriver is &lt;84.0.4147.89-lp151.2.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604365" version="1" comment="chromium is &lt;84.0.4147.89-lp151.2.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604490" version="1" comment="opera is &lt;70.0.3728.71-lp151.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609952" version="1" comment="chromedriver is &lt;84.0.4147.105-lp151.2.112.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609953" version="1" comment="chromium is &lt;84.0.4147.105-lp151.2.112.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605045" version="1" comment="opera is &lt;70.0.3728.133-lp151.2.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609954" version="1" comment="chromedriver is &lt;84.0.4147.125-lp151.2.115.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609955" version="1" comment="chromium is &lt;84.0.4147.125-lp151.2.115.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604981" version="1" comment="chromedriver is &lt;84.0.4147.135-lp151.2.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604982" version="1" comment="chromium is &lt;84.0.4147.135-lp151.2.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609227" version="1" comment="libredwg-devel is &lt;0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609228" version="1" comment="libredwg-tools is &lt;0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609229" version="1" comment="libredwg0 is &lt;0.10-lp151.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606864" version="1" comment="MozillaThunderbird is &lt;68.5.0-lp151.2.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606865" version="1" comment="MozillaThunderbird-translations-common is &lt;68.5.0-lp151.2.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606866" version="1" comment="MozillaThunderbird-translations-other is &lt;68.5.0-lp151.2.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606815" version="1" comment="MozillaFirefox is &lt;68.5.0-lp151.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606816" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.5.0-lp151.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606817" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.5.0-lp151.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606818" version="1" comment="MozillaFirefox-devel is &lt;68.5.0-lp151.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606819" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-lp151.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606820" version="1" comment="MozillaFirefox-translations-other is &lt;68.5.0-lp151.2.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607015" version="1" comment="python2-bleach is &lt;3.1.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009279500" version="1" comment="python2-bleach is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607016" version="1" comment="python3-bleach is &lt;3.1.1-lp151.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009279501" version="1" comment="python3-bleach is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607358" version="1" comment="MozillaFirefox is &lt;68.6.1-lp151.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607359" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.6.1-lp151.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607360" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.6.1-lp151.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607361" version="1" comment="MozillaFirefox-devel is &lt;68.6.1-lp151.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607362" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-lp151.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607363" version="1" comment="MozillaFirefox-translations-other is &lt;68.6.1-lp151.2.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607580" version="1" comment="MozillaThunderbird is &lt;68.7.0-lp151.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607581" version="1" comment="MozillaThunderbird-translations-common is &lt;68.7.0-lp151.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607582" version="1" comment="MozillaThunderbird-translations-other is &lt;68.7.0-lp151.2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607430" version="1" comment="MozillaFirefox is &lt;68.7.0-lp151.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607431" version="1" comment="MozillaFirefox-branding-upstream is &lt;68.7.0-lp151.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607432" version="1" comment="MozillaFirefox-buildsymbols is &lt;68.7.0-lp151.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607433" version="1" comment="MozillaFirefox-devel is &lt;68.7.0-lp151.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607434" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-lp151.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607435" version="1" comment="MozillaFirefox-translations-other is &lt;68.7.0-lp151.2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609956" version="1" comment="storeBackup is &lt;3.5-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009277118" version="1" comment="storeBackup is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607011" version="1" comment="openfortivpn is &lt;1.12.0-lp151.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009279424" version="1" comment="openfortivpn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607069" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607070" version="1" comment="php7 is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607071" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607072" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607073" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607074" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607075" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607076" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607077" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607078" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607079" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607080" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607081" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607082" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607083" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607084" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607085" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607086" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607087" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607088" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607089" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607090" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607091" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607092" version="1" comment="php7-json is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607093" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607094" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607095" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607096" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607097" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607098" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607099" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607100" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607101" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607102" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607103" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607104" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607105" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607106" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607107" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607108" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607109" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607110" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607111" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607112" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607113" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607114" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607115" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607116" version="1" comment="php7-test is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607117" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607118" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607119" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607120" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607121" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607122" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607123" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607124" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607125" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607872" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607873" version="1" comment="libtidy-devel is &lt;5.4.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283044" version="1" comment="libtidy-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607874" version="1" comment="libtidy5 is &lt;5.4.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283045" version="1" comment="libtidy5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607875" version="1" comment="php7 is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607876" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607877" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607878" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607879" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607880" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607881" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607882" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607883" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607884" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607885" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607886" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607887" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607888" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607889" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607890" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607891" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607892" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607893" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607894" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607895" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607896" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607897" version="1" comment="php7-json is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607898" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607899" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607900" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607901" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607902" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607903" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607904" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607905" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607906" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607907" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607908" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607909" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607910" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607911" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607912" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607913" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607914" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607915" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607916" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607917" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607918" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607919" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607920" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607921" version="1" comment="php7-test is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607922" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607923" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607924" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607925" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607926" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607927" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607928" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607929" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607930" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607931" version="1" comment="tidy is &lt;5.4.0-lp151.3.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153017" version="1" comment="tidy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607932" version="1" comment="tidy-doc is &lt;5.4.0-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009283046" version="1" comment="tidy-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605086" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605087" version="1" comment="php7 is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605088" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605089" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605090" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605091" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605092" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605093" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605094" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605095" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605096" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605097" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605098" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605099" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605100" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605101" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605102" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605103" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605104" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605105" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605106" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605107" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605108" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605109" version="1" comment="php7-json is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605110" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605111" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605112" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605113" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605114" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605115" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605116" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605117" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605118" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605119" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605120" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605121" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605122" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605123" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605124" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605125" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605126" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605127" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605128" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605129" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605130" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605131" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605132" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605133" version="1" comment="php7-test is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605134" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605135" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605136" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605137" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605138" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605139" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605140" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605141" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605142" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605746" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605747" version="1" comment="php7 is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605748" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605749" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605750" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605751" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605752" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605753" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605754" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605755" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605756" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605757" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605758" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605759" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605760" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605761" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605762" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605763" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605764" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605765" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605766" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605767" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605768" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605769" version="1" comment="php7-json is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605770" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605771" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605772" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605773" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605774" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605775" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605776" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605777" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605778" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.36.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605779" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.36.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605780" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605781" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605782" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605783" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605784" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605785" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605786" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605787" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605788" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605789" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605790" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605791" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605792" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605793" version="1" comment="php7-test is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605794" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605795" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605796" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605797" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605798" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605799" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605800" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605801" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605802" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.36.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609356" version="1" comment="apache2-mod_php7 is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609357" version="1" comment="php7 is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609358" version="1" comment="php7-bcmath is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609359" version="1" comment="php7-bz2 is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609360" version="1" comment="php7-calendar is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609361" version="1" comment="php7-ctype is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609362" version="1" comment="php7-curl is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609363" version="1" comment="php7-dba is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609364" version="1" comment="php7-devel is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609365" version="1" comment="php7-dom is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609366" version="1" comment="php7-embed is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609367" version="1" comment="php7-enchant is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609368" version="1" comment="php7-exif is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609369" version="1" comment="php7-fastcgi is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609370" version="1" comment="php7-fileinfo is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609371" version="1" comment="php7-firebird is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609372" version="1" comment="php7-fpm is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609373" version="1" comment="php7-ftp is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609374" version="1" comment="php7-gd is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609375" version="1" comment="php7-gettext is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609376" version="1" comment="php7-gmp is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609377" version="1" comment="php7-iconv is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609378" version="1" comment="php7-intl is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609379" version="1" comment="php7-json is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609380" version="1" comment="php7-ldap is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609381" version="1" comment="php7-mbstring is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609382" version="1" comment="php7-mysql is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609383" version="1" comment="php7-odbc is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609384" version="1" comment="php7-opcache is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609385" version="1" comment="php7-openssl is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609386" version="1" comment="php7-pcntl is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609387" version="1" comment="php7-pdo is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609388" version="1" comment="php7-pear is &lt;7.2.5-lp151.6.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609389" version="1" comment="php7-pear-Archive_Tar is &lt;7.2.5-lp151.6.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609390" version="1" comment="php7-pgsql is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609391" version="1" comment="php7-phar is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609392" version="1" comment="php7-posix is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609393" version="1" comment="php7-readline is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609394" version="1" comment="php7-shmop is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609395" version="1" comment="php7-snmp is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609396" version="1" comment="php7-soap is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609397" version="1" comment="php7-sockets is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609398" version="1" comment="php7-sodium is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609399" version="1" comment="php7-sqlite is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609400" version="1" comment="php7-sysvmsg is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609401" version="1" comment="php7-sysvsem is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609402" version="1" comment="php7-sysvshm is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609403" version="1" comment="php7-test is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609404" version="1" comment="php7-tidy is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609405" version="1" comment="php7-tokenizer is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609406" version="1" comment="php7-wddx is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609407" version="1" comment="php7-xmlreader is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609408" version="1" comment="php7-xmlrpc is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609409" version="1" comment="php7-xmlwriter is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609410" version="1" comment="php7-xsl is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609411" version="1" comment="php7-zip is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609412" version="1" comment="php7-zlib is &lt;7.2.5-lp151.6.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609957" version="1" comment="cacti is &lt;1.2.12-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609958" version="1" comment="cacti-spine is &lt;1.2.12-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607427" version="1" comment="exim is &lt;4.88-lp151.4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607428" version="1" comment="eximon is &lt;4.88-lp151.4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607429" version="1" comment="eximstats-html is &lt;4.88-lp151.4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608575" version="1" comment="libkpathsea6 is &lt;6.2.3-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161289" version="1" comment="libkpathsea6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608576" version="1" comment="libptexenc1 is &lt;1.3.5-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236059" version="1" comment="libptexenc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608577" version="1" comment="libsynctex1 is &lt;1.18-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236060" version="1" comment="libsynctex1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608578" version="1" comment="libtexlua52-5 is &lt;5.2.4-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236061" version="1" comment="libtexlua52-5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608579" version="1" comment="libtexluajit2 is &lt;2.1.0beta2-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236062" version="1" comment="libtexluajit2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608580" version="1" comment="perl-biber is &lt;2017.20170520.svn30357-lp151.12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236063" version="1" comment="perl-biber is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608581" version="1" comment="texlive is &lt;2017.20170520-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236064" version="1" comment="texlive is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608582" version="1" comment="texlive-a2ping-bin is &lt;2017.20170520.svn27321-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236065" version="1" comment="texlive-a2ping-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608583" version="1" comment="texlive-accfonts-bin is &lt;2017.20170520.svn12688-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236066" version="1" comment="texlive-accfonts-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608584" version="1" comment="texlive-adhocfilelist-bin is &lt;2017.20170520.svn28038-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236067" version="1" comment="texlive-adhocfilelist-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608585" version="1" comment="texlive-afm2pl-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236068" version="1" comment="texlive-afm2pl-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608586" version="1" comment="texlive-aleph-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236069" version="1" comment="texlive-aleph-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608587" version="1" comment="texlive-amstex-bin is &lt;2017.20170520.svn3006-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236070" version="1" comment="texlive-amstex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608588" version="1" comment="texlive-arara-bin is &lt;2017.20170520.svn29036-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236071" version="1" comment="texlive-arara-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608589" version="1" comment="texlive-asymptote-bin is &lt;2017.20170520.svn43843-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236072" version="1" comment="texlive-asymptote-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608590" version="1" comment="texlive-authorindex-bin is &lt;2017.20170520.svn18790-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236073" version="1" comment="texlive-authorindex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608591" version="1" comment="texlive-autosp-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236074" version="1" comment="texlive-autosp-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608592" version="1" comment="texlive-biber-bin is &lt;2017.20170520.svn42679-lp151.12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236075" version="1" comment="texlive-biber-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608593" version="1" comment="texlive-bibexport-bin is &lt;2017.20170520.svn16219-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236076" version="1" comment="texlive-bibexport-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608594" version="1" comment="texlive-bibtex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236077" version="1" comment="texlive-bibtex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608595" version="1" comment="texlive-bibtex8-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236078" version="1" comment="texlive-bibtex8-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608596" version="1" comment="texlive-bibtexu-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236079" version="1" comment="texlive-bibtexu-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608597" version="1" comment="texlive-bin-devel is &lt;2017.20170520-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236080" version="1" comment="texlive-bin-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608598" version="1" comment="texlive-bundledoc-bin is &lt;2017.20170520.svn17794-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236081" version="1" comment="texlive-bundledoc-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608599" version="1" comment="texlive-cachepic-bin is &lt;2017.20170520.svn15543-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236082" version="1" comment="texlive-cachepic-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608600" version="1" comment="texlive-checkcites-bin is &lt;2017.20170520.svn25623-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236083" version="1" comment="texlive-checkcites-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608601" version="1" comment="texlive-checklistings-bin is &lt;2017.20170520.svn38300-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236084" version="1" comment="texlive-checklistings-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608602" version="1" comment="texlive-chktex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236085" version="1" comment="texlive-chktex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608603" version="1" comment="texlive-cjk-gs-integrate-bin is &lt;2017.20170520.svn37223-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236086" version="1" comment="texlive-cjk-gs-integrate-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608604" version="1" comment="texlive-cjkutils-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236087" version="1" comment="texlive-cjkutils-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608605" version="1" comment="texlive-collection-basic is &lt;2017.135.svn41616-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285689" version="1" comment="texlive-collection-basic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608606" version="1" comment="texlive-collection-bibtexextra is &lt;2017.135.svn44385-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285690" version="1" comment="texlive-collection-bibtexextra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608607" version="1" comment="texlive-collection-binextra is &lt;2017.135.svn44515-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285691" version="1" comment="texlive-collection-binextra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608608" version="1" comment="texlive-collection-context is &lt;2017.135.svn42330-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285692" version="1" comment="texlive-collection-context is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608609" version="1" comment="texlive-collection-fontsextra is &lt;2017.135.svn43356-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285693" version="1" comment="texlive-collection-fontsextra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608610" version="1" comment="texlive-collection-fontsrecommended is &lt;2017.135.svn35830-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285694" version="1" comment="texlive-collection-fontsrecommended is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608611" version="1" comment="texlive-collection-fontutils is &lt;2017.135.svn37105-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285695" version="1" comment="texlive-collection-fontutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608612" version="1" comment="texlive-collection-formatsextra is &lt;2017.135.svn44177-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285696" version="1" comment="texlive-collection-formatsextra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608613" version="1" comment="texlive-collection-games is &lt;2017.135.svn42992-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285697" version="1" comment="texlive-collection-games is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608614" version="1" comment="texlive-collection-humanities is &lt;2017.135.svn42268-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285698" version="1" comment="texlive-collection-humanities is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608615" version="1" comment="texlive-collection-langarabic is &lt;2017.135.svn44496-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285699" version="1" comment="texlive-collection-langarabic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608616" version="1" comment="texlive-collection-langchinese is &lt;2017.135.svn42675-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285700" version="1" comment="texlive-collection-langchinese is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608617" version="1" comment="texlive-collection-langcjk is &lt;2017.135.svn43009-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285701" version="1" comment="texlive-collection-langcjk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608618" version="1" comment="texlive-collection-langcyrillic is &lt;2017.135.svn44401-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285702" version="1" comment="texlive-collection-langcyrillic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608619" version="1" comment="texlive-collection-langczechslovak is &lt;2017.135.svn32550-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285703" version="1" comment="texlive-collection-langczechslovak is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608620" version="1" comment="texlive-collection-langenglish is &lt;2017.135.svn43650-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285704" version="1" comment="texlive-collection-langenglish is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608621" version="1" comment="texlive-collection-langeuropean is &lt;2017.135.svn44414-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285705" version="1" comment="texlive-collection-langeuropean is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608622" version="1" comment="texlive-collection-langfrench is &lt;2017.135.svn40375-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285706" version="1" comment="texlive-collection-langfrench is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608623" version="1" comment="texlive-collection-langgerman is &lt;2017.135.svn42045-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285707" version="1" comment="texlive-collection-langgerman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608624" version="1" comment="texlive-collection-langgreek is &lt;2017.135.svn44192-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285708" version="1" comment="texlive-collection-langgreek is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608625" version="1" comment="texlive-collection-langitalian is &lt;2017.135.svn30372-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285709" version="1" comment="texlive-collection-langitalian is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608626" version="1" comment="texlive-collection-langjapanese is &lt;2017.135.svn44554-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285710" version="1" comment="texlive-collection-langjapanese is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608627" version="1" comment="texlive-collection-langkorean is &lt;2017.135.svn42106-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285711" version="1" comment="texlive-collection-langkorean is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608628" version="1" comment="texlive-collection-langother is &lt;2017.135.svn44414-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285712" version="1" comment="texlive-collection-langother is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608629" version="1" comment="texlive-collection-langpolish is &lt;2017.135.svn44371-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285713" version="1" comment="texlive-collection-langpolish is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608630" version="1" comment="texlive-collection-langportuguese is &lt;2017.135.svn30962-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285714" version="1" comment="texlive-collection-langportuguese is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608631" version="1" comment="texlive-collection-langspanish is &lt;2017.135.svn40587-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285715" version="1" comment="texlive-collection-langspanish is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608632" version="1" comment="texlive-collection-latex is &lt;2017.135.svn41614-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285716" version="1" comment="texlive-collection-latex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608633" version="1" comment="texlive-collection-latexextra is &lt;2017.135.svn44544-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285717" version="1" comment="texlive-collection-latexextra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608634" version="1" comment="texlive-collection-latexrecommended is &lt;2017.135.svn44177-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285718" version="1" comment="texlive-collection-latexrecommended is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608635" version="1" comment="texlive-collection-luatex is &lt;2017.135.svn44500-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285719" version="1" comment="texlive-collection-luatex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608636" version="1" comment="texlive-collection-mathscience is &lt;2017.135.svn44396-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285720" version="1" comment="texlive-collection-mathscience is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608637" version="1" comment="texlive-collection-metapost is &lt;2017.135.svn44297-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285721" version="1" comment="texlive-collection-metapost is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608638" version="1" comment="texlive-collection-music is &lt;2017.135.svn40561-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285722" version="1" comment="texlive-collection-music is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608639" version="1" comment="texlive-collection-pictures is &lt;2017.135.svn44395-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285723" version="1" comment="texlive-collection-pictures is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608640" version="1" comment="texlive-collection-plaingeneric is &lt;2017.135.svn44177-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285724" version="1" comment="texlive-collection-plaingeneric is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608641" version="1" comment="texlive-collection-pstricks is &lt;2017.135.svn44460-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285725" version="1" comment="texlive-collection-pstricks is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608642" version="1" comment="texlive-collection-publishers is &lt;2017.135.svn44485-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285726" version="1" comment="texlive-collection-publishers is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608643" version="1" comment="texlive-collection-xetex is &lt;2017.135.svn43059-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285727" version="1" comment="texlive-collection-xetex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608644" version="1" comment="texlive-context-bin is &lt;2017.20170520.svn34112-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236088" version="1" comment="texlive-context-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608645" version="1" comment="texlive-convbkmk-bin is &lt;2017.20170520.svn30408-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236089" version="1" comment="texlive-convbkmk-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608646" version="1" comment="texlive-crossrefware-bin is &lt;2017.20170520.svn43866-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236090" version="1" comment="texlive-crossrefware-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608647" version="1" comment="texlive-cslatex-bin is &lt;2017.20170520.svn3006-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236091" version="1" comment="texlive-cslatex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608648" version="1" comment="texlive-csplain-bin is &lt;2017.20170520.svn33902-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236092" version="1" comment="texlive-csplain-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608649" version="1" comment="texlive-ctanify-bin is &lt;2017.20170520.svn24061-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236093" version="1" comment="texlive-ctanify-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608650" version="1" comment="texlive-ctanupload-bin is &lt;2017.20170520.svn23866-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236094" version="1" comment="texlive-ctanupload-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608651" version="1" comment="texlive-ctie-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236095" version="1" comment="texlive-ctie-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608652" version="1" comment="texlive-cweb-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236096" version="1" comment="texlive-cweb-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608653" version="1" comment="texlive-cyrillic-bin-bin is &lt;2017.20170520.svn29741-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236097" version="1" comment="texlive-cyrillic-bin-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608654" version="1" comment="texlive-de-macro-bin is &lt;2017.20170520.svn17399-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236098" version="1" comment="texlive-de-macro-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608655" version="1" comment="texlive-detex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236099" version="1" comment="texlive-detex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608656" version="1" comment="texlive-devel is &lt;2017.135-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285728" version="1" comment="texlive-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608657" version="1" comment="texlive-diadia-bin is &lt;2017.20170520.svn37645-lp151.12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236101" version="1" comment="texlive-diadia-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608658" version="1" comment="texlive-dosepsbin-bin is &lt;2017.20170520.svn24759-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236102" version="1" comment="texlive-dosepsbin-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608659" version="1" comment="texlive-dtl-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236103" version="1" comment="texlive-dtl-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608660" version="1" comment="texlive-dtxgen-bin is &lt;2017.20170520.svn29031-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236104" version="1" comment="texlive-dtxgen-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608661" version="1" comment="texlive-dviasm-bin is &lt;2017.20170520.svn8329-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236105" version="1" comment="texlive-dviasm-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608662" version="1" comment="texlive-dvicopy-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236106" version="1" comment="texlive-dvicopy-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608663" version="1" comment="texlive-dvidvi-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236107" version="1" comment="texlive-dvidvi-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608664" version="1" comment="texlive-dviinfox-bin is &lt;2017.20170520.svn44515-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237840" version="1" comment="texlive-dviinfox-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608665" version="1" comment="texlive-dviljk-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236108" version="1" comment="texlive-dviljk-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608666" version="1" comment="texlive-dvipdfmx-bin is &lt;2017.20170520.svn40273-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236109" version="1" comment="texlive-dvipdfmx-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608667" version="1" comment="texlive-dvipng-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236110" version="1" comment="texlive-dvipng-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608668" version="1" comment="texlive-dvipos-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236111" version="1" comment="texlive-dvipos-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608669" version="1" comment="texlive-dvips-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236112" version="1" comment="texlive-dvips-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608670" version="1" comment="texlive-dvisvgm-bin is &lt;2017.20170520.svn40987-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236113" version="1" comment="texlive-dvisvgm-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608671" version="1" comment="texlive-ebong-bin is &lt;2017.20170520.svn21000-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236114" version="1" comment="texlive-ebong-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608672" version="1" comment="texlive-eplain-bin is &lt;2017.20170520.svn3006-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236115" version="1" comment="texlive-eplain-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608673" version="1" comment="texlive-epspdf-bin is &lt;2017.20170520.svn29050-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236116" version="1" comment="texlive-epspdf-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608674" version="1" comment="texlive-epstopdf-bin is &lt;2017.20170520.svn18336-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236117" version="1" comment="texlive-epstopdf-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608675" version="1" comment="texlive-exceltex-bin is &lt;2017.20170520.svn25860-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236118" version="1" comment="texlive-exceltex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608676" version="1" comment="texlive-extratools is &lt;2017.135-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285729" version="1" comment="texlive-extratools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608677" version="1" comment="texlive-fig4latex-bin is &lt;2017.20170520.svn14752-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236119" version="1" comment="texlive-fig4latex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608678" version="1" comment="texlive-filesystem is &lt;2017.135-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285730" version="1" comment="texlive-filesystem is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608679" version="1" comment="texlive-findhyph-bin is &lt;2017.20170520.svn14758-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236120" version="1" comment="texlive-findhyph-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608680" version="1" comment="texlive-fontinst-bin is &lt;2017.20170520.svn29741-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236121" version="1" comment="texlive-fontinst-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608681" version="1" comment="texlive-fontools-bin is &lt;2017.20170520.svn25997-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236122" version="1" comment="texlive-fontools-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608682" version="1" comment="texlive-fontware-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236123" version="1" comment="texlive-fontware-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608683" version="1" comment="texlive-fragmaster-bin is &lt;2017.20170520.svn13663-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236124" version="1" comment="texlive-fragmaster-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608684" version="1" comment="texlive-getmap-bin is &lt;2017.20170520.svn34971-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236125" version="1" comment="texlive-getmap-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608685" version="1" comment="texlive-glossaries-bin is &lt;2017.20170520.svn37813-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236126" version="1" comment="texlive-glossaries-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608686" version="1" comment="texlive-gregoriotex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236127" version="1" comment="texlive-gregoriotex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608687" version="1" comment="texlive-gsftopk-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236128" version="1" comment="texlive-gsftopk-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608688" version="1" comment="texlive-jadetex-bin is &lt;2017.20170520.svn3006-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236129" version="1" comment="texlive-jadetex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608689" version="1" comment="texlive-kotex-utils-bin is &lt;2017.20170520.svn32101-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236131" version="1" comment="texlive-kotex-utils-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608690" version="1" comment="texlive-kpathsea-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236132" version="1" comment="texlive-kpathsea-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608691" version="1" comment="texlive-kpathsea-devel is &lt;6.2.3-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236133" version="1" comment="texlive-kpathsea-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608692" version="1" comment="texlive-lacheck-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236134" version="1" comment="texlive-lacheck-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608693" version="1" comment="texlive-latex-bin-bin is &lt;2017.20170520.svn14050-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236135" version="1" comment="texlive-latex-bin-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608694" version="1" comment="texlive-latex-git-log-bin is &lt;2017.20170520.svn30983-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236136" version="1" comment="texlive-latex-git-log-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608695" version="1" comment="texlive-latex-papersize-bin is &lt;2017.20170520.svn42296-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237841" version="1" comment="texlive-latex-papersize-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608696" version="1" comment="texlive-latex2man-bin is &lt;2017.20170520.svn13663-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236137" version="1" comment="texlive-latex2man-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608697" version="1" comment="texlive-latex2nemeth-bin is &lt;2017.20170520.svn42300-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237842" version="1" comment="texlive-latex2nemeth-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608698" version="1" comment="texlive-latexdiff-bin is &lt;2017.20170520.svn16420-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236138" version="1" comment="texlive-latexdiff-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608699" version="1" comment="texlive-latexfileversion-bin is &lt;2017.20170520.svn25012-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236139" version="1" comment="texlive-latexfileversion-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608700" version="1" comment="texlive-latexindent-bin is &lt;2017.20170520.svn32150-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236140" version="1" comment="texlive-latexindent-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608701" version="1" comment="texlive-latexmk-bin is &lt;2017.20170520.svn10937-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236141" version="1" comment="texlive-latexmk-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608702" version="1" comment="texlive-latexpand-bin is &lt;2017.20170520.svn27025-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236142" version="1" comment="texlive-latexpand-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608703" version="1" comment="texlive-lcdftypetools-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236143" version="1" comment="texlive-lcdftypetools-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608704" version="1" comment="texlive-lilyglyphs-bin is &lt;2017.20170520.svn31696-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236144" version="1" comment="texlive-lilyglyphs-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608705" version="1" comment="texlive-listbib-bin is &lt;2017.20170520.svn26126-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236145" version="1" comment="texlive-listbib-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608706" version="1" comment="texlive-listings-ext-bin is &lt;2017.20170520.svn15093-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236146" version="1" comment="texlive-listings-ext-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608707" version="1" comment="texlive-lollipop-bin is &lt;2017.20170520.svn41465-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236147" version="1" comment="texlive-lollipop-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608708" version="1" comment="texlive-ltxfileinfo-bin is &lt;2017.20170520.svn29005-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236148" version="1" comment="texlive-ltxfileinfo-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608709" version="1" comment="texlive-ltximg-bin is &lt;2017.20170520.svn32346-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236149" version="1" comment="texlive-ltximg-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608710" version="1" comment="texlive-lua2dox-bin is &lt;2017.20170520.svn29053-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236150" version="1" comment="texlive-lua2dox-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608711" version="1" comment="texlive-luaotfload-bin is &lt;2017.20170520.svn34647-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236151" version="1" comment="texlive-luaotfload-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608712" version="1" comment="texlive-luatex-bin is &lt;2017.20170520.svn44549-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236152" version="1" comment="texlive-luatex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608713" version="1" comment="texlive-lwarp-bin is &lt;2017.20170520.svn43292-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237843" version="1" comment="texlive-lwarp-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608714" version="1" comment="texlive-m-tx-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236153" version="1" comment="texlive-m-tx-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608715" version="1" comment="texlive-make4ht-bin is &lt;2017.20170520.svn37750-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236154" version="1" comment="texlive-make4ht-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608716" version="1" comment="texlive-makedtx-bin is &lt;2017.20170520.svn38769-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236155" version="1" comment="texlive-makedtx-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608717" version="1" comment="texlive-makeindex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236156" version="1" comment="texlive-makeindex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608718" version="1" comment="texlive-match_parens-bin is &lt;2017.20170520.svn23500-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236157" version="1" comment="texlive-match_parens-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608719" version="1" comment="texlive-mathspic-bin is &lt;2017.20170520.svn23661-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236158" version="1" comment="texlive-mathspic-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608720" version="1" comment="texlive-metafont-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236159" version="1" comment="texlive-metafont-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608721" version="1" comment="texlive-metapost-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236160" version="1" comment="texlive-metapost-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608722" version="1" comment="texlive-mex-bin is &lt;2017.20170520.svn3006-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236161" version="1" comment="texlive-mex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608723" version="1" comment="texlive-mf2pt1-bin is &lt;2017.20170520.svn23406-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236162" version="1" comment="texlive-mf2pt1-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608724" version="1" comment="texlive-mflua-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236163" version="1" comment="texlive-mflua-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608725" version="1" comment="texlive-mfware-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236164" version="1" comment="texlive-mfware-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608726" version="1" comment="texlive-mkgrkindex-bin is &lt;2017.20170520.svn14428-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236165" version="1" comment="texlive-mkgrkindex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608727" version="1" comment="texlive-mkjobtexmf-bin is &lt;2017.20170520.svn8457-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236166" version="1" comment="texlive-mkjobtexmf-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608728" version="1" comment="texlive-mkpic-bin is &lt;2017.20170520.svn33688-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236167" version="1" comment="texlive-mkpic-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608729" version="1" comment="texlive-mltex-bin is &lt;2017.20170520.svn3006-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236168" version="1" comment="texlive-mltex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608730" version="1" comment="texlive-mptopdf-bin is &lt;2017.20170520.svn18674-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236169" version="1" comment="texlive-mptopdf-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608731" version="1" comment="texlive-multibibliography-bin is &lt;2017.20170520.svn30534-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236170" version="1" comment="texlive-multibibliography-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608732" version="1" comment="texlive-musixtex-bin is &lt;2017.20170520.svn37026-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236171" version="1" comment="texlive-musixtex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608733" version="1" comment="texlive-musixtnt-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236172" version="1" comment="texlive-musixtnt-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608734" version="1" comment="texlive-omegaware-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236173" version="1" comment="texlive-omegaware-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608735" version="1" comment="texlive-patgen-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236174" version="1" comment="texlive-patgen-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608736" version="1" comment="texlive-pax-bin is &lt;2017.20170520.svn10843-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236175" version="1" comment="texlive-pax-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608737" version="1" comment="texlive-pdfbook2-bin is &lt;2017.20170520.svn37537-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236176" version="1" comment="texlive-pdfbook2-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608738" version="1" comment="texlive-pdfcrop-bin is &lt;2017.20170520.svn14387-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236177" version="1" comment="texlive-pdfcrop-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608739" version="1" comment="texlive-pdfjam-bin is &lt;2017.20170520.svn17868-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236178" version="1" comment="texlive-pdfjam-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608740" version="1" comment="texlive-pdflatexpicscale-bin is &lt;2017.20170520.svn41779-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237844" version="1" comment="texlive-pdflatexpicscale-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608741" version="1" comment="texlive-pdftex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236179" version="1" comment="texlive-pdftex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608742" version="1" comment="texlive-pdftools-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236180" version="1" comment="texlive-pdftools-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608743" version="1" comment="texlive-pdfxup-bin is &lt;2017.20170520.svn40690-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236181" version="1" comment="texlive-pdfxup-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608744" version="1" comment="texlive-pedigree-perl-bin is &lt;2017.20170520.svn25962-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236182" version="1" comment="texlive-pedigree-perl-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608745" version="1" comment="texlive-perltex-bin is &lt;2017.20170520.svn16181-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236183" version="1" comment="texlive-perltex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608746" version="1" comment="texlive-petri-nets-bin is &lt;2017.20170520.svn39165-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236184" version="1" comment="texlive-petri-nets-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608747" version="1" comment="texlive-pfarrei-bin is &lt;2017.20170520.svn29348-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236185" version="1" comment="texlive-pfarrei-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608748" version="1" comment="texlive-pkfix-bin is &lt;2017.20170520.svn13364-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236186" version="1" comment="texlive-pkfix-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608749" version="1" comment="texlive-pkfix-helper-bin is &lt;2017.20170520.svn13663-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236187" version="1" comment="texlive-pkfix-helper-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608750" version="1" comment="texlive-platex-bin is &lt;2017.20170520.svn22859-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236188" version="1" comment="texlive-platex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608751" version="1" comment="texlive-pmx-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236189" version="1" comment="texlive-pmx-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608752" version="1" comment="texlive-pmxchords-bin is &lt;2017.20170520.svn32405-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236190" version="1" comment="texlive-pmxchords-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608753" version="1" comment="texlive-ps2pk-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236191" version="1" comment="texlive-ps2pk-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608754" version="1" comment="texlive-pst-pdf-bin is &lt;2017.20170520.svn7838-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236192" version="1" comment="texlive-pst-pdf-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608755" version="1" comment="texlive-pst2pdf-bin is &lt;2017.20170520.svn29333-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236193" version="1" comment="texlive-pst2pdf-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608756" version="1" comment="texlive-pstools-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236194" version="1" comment="texlive-pstools-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608757" version="1" comment="texlive-ptex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236195" version="1" comment="texlive-ptex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608758" version="1" comment="texlive-ptex-fontmaps-bin is &lt;2017.20170520.svn44206-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237845" version="1" comment="texlive-ptex-fontmaps-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608759" version="1" comment="texlive-ptex2pdf-bin is &lt;2017.20170520.svn29335-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236196" version="1" comment="texlive-ptex2pdf-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608760" version="1" comment="texlive-ptexenc-devel is &lt;1.3.5-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236197" version="1" comment="texlive-ptexenc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608761" version="1" comment="texlive-purifyeps-bin is &lt;2017.20170520.svn13663-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236198" version="1" comment="texlive-purifyeps-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608762" version="1" comment="texlive-pygmentex-bin is &lt;2017.20170520.svn34996-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236199" version="1" comment="texlive-pygmentex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608763" version="1" comment="texlive-pythontex-bin is &lt;2017.20170520.svn31638-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236200" version="1" comment="texlive-pythontex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608764" version="1" comment="texlive-rubik-bin is &lt;2017.20170520.svn32919-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236201" version="1" comment="texlive-rubik-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608765" version="1" comment="texlive-scheme-basic is &lt;2017.135.svn25923-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285731" version="1" comment="texlive-scheme-basic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608766" version="1" comment="texlive-scheme-context is &lt;2017.135.svn35799-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285732" version="1" comment="texlive-scheme-context is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608767" version="1" comment="texlive-scheme-full is &lt;2017.135.svn44177-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285733" version="1" comment="texlive-scheme-full is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608768" version="1" comment="texlive-scheme-gust is &lt;2017.135.svn44177-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285734" version="1" comment="texlive-scheme-gust is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608769" version="1" comment="texlive-scheme-infraonly is &lt;2017.135.svn41515-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285735" version="1" comment="texlive-scheme-infraonly is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608770" version="1" comment="texlive-scheme-medium is &lt;2017.135.svn44177-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285736" version="1" comment="texlive-scheme-medium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608771" version="1" comment="texlive-scheme-minimal is &lt;2017.135.svn13822-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285737" version="1" comment="texlive-scheme-minimal is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608772" version="1" comment="texlive-scheme-small is &lt;2017.135.svn41825-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285738" version="1" comment="texlive-scheme-small is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608773" version="1" comment="texlive-scheme-tetex is &lt;2017.135.svn44187-lp151.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285739" version="1" comment="texlive-scheme-tetex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608774" version="1" comment="texlive-seetexk-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236202" version="1" comment="texlive-seetexk-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608775" version="1" comment="texlive-splitindex-bin is &lt;2017.20170520.svn29688-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236203" version="1" comment="texlive-splitindex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608776" version="1" comment="texlive-srcredact-bin is &lt;2017.20170520.svn38710-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236204" version="1" comment="texlive-srcredact-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608777" version="1" comment="texlive-sty2dtx-bin is &lt;2017.20170520.svn21215-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236205" version="1" comment="texlive-sty2dtx-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608778" version="1" comment="texlive-svn-multi-bin is &lt;2017.20170520.svn13663-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236206" version="1" comment="texlive-svn-multi-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608779" version="1" comment="texlive-synctex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236207" version="1" comment="texlive-synctex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608780" version="1" comment="texlive-synctex-devel is &lt;1.18-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236208" version="1" comment="texlive-synctex-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608781" version="1" comment="texlive-tetex-bin is &lt;2017.20170520.svn43957-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236209" version="1" comment="texlive-tetex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608782" version="1" comment="texlive-tex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236210" version="1" comment="texlive-tex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608783" version="1" comment="texlive-tex4ebook-bin is &lt;2017.20170520.svn37771-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236211" version="1" comment="texlive-tex4ebook-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608784" version="1" comment="texlive-tex4ht-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236212" version="1" comment="texlive-tex4ht-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608785" version="1" comment="texlive-texconfig-bin is &lt;2017.20170520.svn29741-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236213" version="1" comment="texlive-texconfig-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608786" version="1" comment="texlive-texcount-bin is &lt;2017.20170520.svn13013-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236214" version="1" comment="texlive-texcount-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608787" version="1" comment="texlive-texdef-bin is &lt;2017.20170520.svn21802-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236215" version="1" comment="texlive-texdef-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608788" version="1" comment="texlive-texdiff-bin is &lt;2017.20170520.svn15506-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236216" version="1" comment="texlive-texdiff-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608789" version="1" comment="texlive-texdirflatten-bin is &lt;2017.20170520.svn12782-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236217" version="1" comment="texlive-texdirflatten-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608790" version="1" comment="texlive-texdoc-bin is &lt;2017.20170520.svn29741-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236218" version="1" comment="texlive-texdoc-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608791" version="1" comment="texlive-texfot-bin is &lt;2017.20170520.svn33155-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236219" version="1" comment="texlive-texfot-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608792" version="1" comment="texlive-texliveonfly-bin is &lt;2017.20170520.svn24062-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236220" version="1" comment="texlive-texliveonfly-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608793" version="1" comment="texlive-texloganalyser-bin is &lt;2017.20170520.svn13663-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236221" version="1" comment="texlive-texloganalyser-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608794" version="1" comment="texlive-texlua-devel is &lt;5.2.4-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236222" version="1" comment="texlive-texlua-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608795" version="1" comment="texlive-texluajit-devel is &lt;2.1.0beta2-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236223" version="1" comment="texlive-texluajit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608796" version="1" comment="texlive-texosquery-bin is &lt;2017.20170520.svn43596-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237846" version="1" comment="texlive-texosquery-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608797" version="1" comment="texlive-texsis-bin is &lt;2017.20170520.svn3006-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236224" version="1" comment="texlive-texsis-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608798" version="1" comment="texlive-texware-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236225" version="1" comment="texlive-texware-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608799" version="1" comment="texlive-thumbpdf-bin is &lt;2017.20170520.svn6898-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236226" version="1" comment="texlive-thumbpdf-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608800" version="1" comment="texlive-tie-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236227" version="1" comment="texlive-tie-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608801" version="1" comment="texlive-tpic2pdftex-bin is &lt;2017.20170520.svn29741-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236228" version="1" comment="texlive-tpic2pdftex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608802" version="1" comment="texlive-ttfutils-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236229" version="1" comment="texlive-ttfutils-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608803" version="1" comment="texlive-typeoutfileinfo-bin is &lt;2017.20170520.svn25648-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236230" version="1" comment="texlive-typeoutfileinfo-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608804" version="1" comment="texlive-ulqda-bin is &lt;2017.20170520.svn13663-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236231" version="1" comment="texlive-ulqda-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608805" version="1" comment="texlive-uplatex-bin is &lt;2017.20170520.svn26326-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236232" version="1" comment="texlive-uplatex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608806" version="1" comment="texlive-uptex-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236233" version="1" comment="texlive-uptex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608807" version="1" comment="texlive-urlbst-bin is &lt;2017.20170520.svn23262-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236234" version="1" comment="texlive-urlbst-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608808" version="1" comment="texlive-velthuis-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009237847" version="1" comment="texlive-velthuis-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608809" version="1" comment="texlive-vlna-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236235" version="1" comment="texlive-vlna-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608810" version="1" comment="texlive-vpe-bin is &lt;2017.20170520.svn6897-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236236" version="1" comment="texlive-vpe-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608811" version="1" comment="texlive-web-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236237" version="1" comment="texlive-web-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608812" version="1" comment="texlive-xdvi-bin is &lt;2017.20170520.svn44143-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236238" version="1" comment="texlive-xdvi-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608813" version="1" comment="texlive-xetex-bin is &lt;2017.20170520.svn44361-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236239" version="1" comment="texlive-xetex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608814" version="1" comment="texlive-xmltex-bin is &lt;2017.20170520.svn3006-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236240" version="1" comment="texlive-xmltex-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608815" version="1" comment="texlive-yplan-bin is &lt;2017.20170520.svn34398-lp151.12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236241" version="1" comment="texlive-yplan-bin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609127" version="1" comment="tomcat is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609128" version="1" comment="tomcat-admin-webapps is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609129" version="1" comment="tomcat-docs-webapp is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609130" version="1" comment="tomcat-el-3_0-api is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609131" version="1" comment="tomcat-embed is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609132" version="1" comment="tomcat-javadoc is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609133" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609134" version="1" comment="tomcat-jsvc is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609135" version="1" comment="tomcat-lib is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609136" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609137" version="1" comment="tomcat-webapps is &lt;9.0.35-lp151.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609207" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609208" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp151.10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609209" version="1" comment="libldap-data is &lt;2.4.46-lp151.10.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609210" version="1" comment="openldap2 is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609211" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609212" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609213" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609214" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609215" version="1" comment="openldap2-client is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609216" version="1" comment="openldap2-contrib is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609217" version="1" comment="openldap2-devel is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609218" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp151.10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609219" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609220" version="1" comment="openldap2-doc is &lt;2.4.46-lp151.10.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609221" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp151.10.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609959" version="1" comment="hylafax+ is &lt;7.0.3-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609960" version="1" comment="hylafax+-client is &lt;7.0.3-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609226" version="1" comment="libfaxutil7_0_2 is &lt;7.0.2-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287514" version="1" comment="libfaxutil7_0_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609961" version="1" comment="libfaxutil7_0_3 is &lt;7.0.3-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604992" version="1" comment="inn is &lt;2.5.4-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604993" version="1" comment="inn-devel is &lt;2.5.4-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604994" version="1" comment="mininews is &lt;2.5.4-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605401" version="1" comment="libldap-2_4-2 is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605402" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-lp151.10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605403" version="1" comment="libldap-data is &lt;2.4.46-lp151.10.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605404" version="1" comment="openldap2 is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605405" version="1" comment="openldap2-back-meta is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605406" version="1" comment="openldap2-back-perl is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605407" version="1" comment="openldap2-back-sock is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605408" version="1" comment="openldap2-back-sql is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605409" version="1" comment="openldap2-client is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605410" version="1" comment="openldap2-contrib is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605411" version="1" comment="openldap2-devel is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605412" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-lp151.10.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605413" version="1" comment="openldap2-devel-static is &lt;2.4.46-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605414" version="1" comment="openldap2-doc is &lt;2.4.46-lp151.10.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605415" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-lp151.10.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606204" version="1" comment="tcpdump is &lt;4.9.2-lp151.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609962" version="1" comment="nextcloud is &lt;20.0.0-lp151.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605399" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253149" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605400" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is &lt;5.1.4-lp151.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253150" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605557" version="1" comment="ruby2.5-rubygem-activesupport-5_1 is &lt;5.1.4-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295961" version="1" comment="ruby2.5-rubygem-activesupport-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605558" version="1" comment="ruby2.5-rubygem-activesupport-doc-5_1 is &lt;5.1.4-lp151.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009295962" version="1" comment="ruby2.5-rubygem-activesupport-doc-5_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609118" version="1" comment="curl is &lt;7.60.0-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609119" version="1" comment="curl-mini is &lt;7.60.0-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609120" version="1" comment="libcurl-devel is &lt;7.60.0-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609121" version="1" comment="libcurl-devel-32bit is &lt;7.60.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609122" version="1" comment="libcurl-mini-devel is &lt;7.60.0-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609123" version="1" comment="libcurl4 is &lt;7.60.0-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609124" version="1" comment="libcurl4-32bit is &lt;7.60.0-lp151.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609125" version="1" comment="libcurl4-mini is &lt;7.60.0-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605077" version="1" comment="curl is &lt;7.60.0-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605078" version="1" comment="curl-mini is &lt;7.60.0-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605079" version="1" comment="libcurl-devel is &lt;7.60.0-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605080" version="1" comment="libcurl-devel-32bit is &lt;7.60.0-lp151.5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605081" version="1" comment="libcurl-mini-devel is &lt;7.60.0-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605082" version="1" comment="libcurl4 is &lt;7.60.0-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605083" version="1" comment="libcurl4-32bit is &lt;7.60.0-lp151.5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009605084" version="1" comment="libcurl4-mini is &lt;7.60.0-lp151.5.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606331" version="1" comment="c-ares-devel is &lt;1.17.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300208" version="1" comment="c-ares-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606332" version="1" comment="c-ares-utils is &lt;1.17.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009300210" version="1" comment="c-ares-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606333" version="1" comment="libcares2 is &lt;1.17.0-lp151.3.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153706" version="1" comment="libcares2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606334" version="1" comment="libcares2-32bit is &lt;1.17.0-lp151.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153707" version="1" comment="libcares2-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606741" version="1" comment="curl is &lt;7.60.0-lp151.5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606742" version="1" comment="curl-mini is &lt;7.60.0-lp151.5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606743" version="1" comment="libcurl-devel is &lt;7.60.0-lp151.5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606744" version="1" comment="libcurl-devel-32bit is &lt;7.60.0-lp151.5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606745" version="1" comment="libcurl-mini-devel is &lt;7.60.0-lp151.5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606746" version="1" comment="libcurl4 is &lt;7.60.0-lp151.5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606747" version="1" comment="libcurl4-32bit is &lt;7.60.0-lp151.5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606748" version="1" comment="libcurl4-mini is &lt;7.60.0-lp151.5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607823" version="1" comment="squid is &lt;4.10-lp151.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606992" version="1" comment="ppp is &lt;2.4.7-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152115" version="1" comment="ppp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606993" version="1" comment="ppp-devel is &lt;2.4.7-lp151.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152785" version="1" comment="ppp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606994" version="1" comment="ppp-modem is &lt;2.4.7-lp151.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009279345" version="1" comment="ppp-modem is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607307" version="1" comment="cloud-init is &lt;19.4-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607308" version="1" comment="cloud-init-config-suse is &lt;19.4-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009607309" version="1" comment="cloud-init-doc is &lt;19.4-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009606502" version="1" comment="ucode-intel is &lt;20201118-lp151.2.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609345" version="1" comment="google-compute-engine-init is &lt;20190801-lp151.2.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287516" version="1" comment="google-compute-engine-init is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609346" version="1" comment="google-compute-engine-oslogin is &lt;20190801-lp151.2.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287517" version="1" comment="google-compute-engine-oslogin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609347" version="1" comment="google-compute-engine-oslogin-32bit is &lt;20190801-lp151.2.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287518" version="1" comment="google-compute-engine-oslogin-32bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609963" version="1" comment="weechat is &lt;2.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155009" version="1" comment="weechat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609964" version="1" comment="weechat-aspell is &lt;2.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155010" version="1" comment="weechat-aspell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609965" version="1" comment="weechat-devel is &lt;2.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155011" version="1" comment="weechat-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609966" version="1" comment="weechat-guile is &lt;2.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155013" version="1" comment="weechat-guile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609967" version="1" comment="weechat-lang is &lt;2.1-lp151.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155014" version="1" comment="weechat-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609968" version="1" comment="weechat-lua is &lt;2.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155015" version="1" comment="weechat-lua is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609969" version="1" comment="weechat-perl is &lt;2.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155016" version="1" comment="weechat-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609970" version="1" comment="weechat-python is &lt;2.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155017" version="1" comment="weechat-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609971" version="1" comment="weechat-ruby is &lt;2.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155018" version="1" comment="weechat-ruby is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609972" version="1" comment="weechat-tcl is &lt;2.1-lp151.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155019" version="1" comment="weechat-tcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609973" version="1" comment="proftpd is &lt;1.3.6c-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609974" version="1" comment="proftpd-devel is &lt;1.3.6c-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609975" version="1" comment="proftpd-doc is &lt;1.3.6c-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609976" version="1" comment="proftpd-lang is &lt;1.3.6c-lp151.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609977" version="1" comment="proftpd-ldap is &lt;1.3.6c-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609978" version="1" comment="proftpd-mysql is &lt;1.3.6c-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609979" version="1" comment="proftpd-pgsql is &lt;1.3.6c-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609980" version="1" comment="proftpd-radius is &lt;1.3.6c-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609981" version="1" comment="proftpd-sqlite is &lt;1.3.6c-lp151.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608115" version="1" comment="tomcat is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608116" version="1" comment="tomcat-admin-webapps is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608117" version="1" comment="tomcat-docs-webapp is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608118" version="1" comment="tomcat-el-3_0-api is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608119" version="1" comment="tomcat-embed is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608120" version="1" comment="tomcat-javadoc is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608121" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608122" version="1" comment="tomcat-jsvc is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608123" version="1" comment="tomcat-lib is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608124" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009608125" version="1" comment="tomcat-webapps is &lt;9.0.35-lp151.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604941" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-lp151.2.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604942" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.28.4-lp151.2.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604943" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-lp151.2.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604944" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.28.4-lp151.2.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604945" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.4-lp151.2.24.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604946" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-lp151.2.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604947" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-lp151.2.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604948" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-lp151.2.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604949" version="1" comment="webkit-jsc-4 is &lt;2.28.4-lp151.2.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604950" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-lp151.2.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604951" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-lp151.2.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009604952" version="1" comment="webkit2gtk3-minibrowser is &lt;2.28.4-lp151.2.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609465" version="1" comment="sudo is &lt;1.8.22-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609466" version="1" comment="sudo-devel is &lt;1.8.22-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609467" version="1" comment="sudo-test is &lt;1.8.22-lp151.5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609471" version="1" comment="go1.14 is &lt;1.14.14-lp151.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609472" version="1" comment="go1.14-doc is &lt;1.14.14-lp151.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609473" version="1" comment="go1.14-race is &lt;1.14.14-lp151.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609431" version="1" comment="libtcmu2 is &lt;1.4.0-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342056" version="1" comment="libtcmu2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609432" version="1" comment="tcmu-runner is &lt;1.4.0-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342057" version="1" comment="tcmu-runner is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609433" version="1" comment="tcmu-runner-handler-rbd is &lt;1.4.0-lp151.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342058" version="1" comment="tcmu-runner-handler-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609460" version="1" comment="mutt is &lt;1.10.1-lp151.2.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609461" version="1" comment="mutt-doc is &lt;1.10.1-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009609462" version="1" comment="mutt-lang is &lt;1.10.1-lp151.2.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009144625"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-spine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_5-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imapfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cri-o</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cri-o-kubeadm-criconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cri-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-kubelet1.17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-kubelet1.18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Twig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-auto-enable-devices</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldns2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DNS-LDNS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>knot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ledger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mp3gain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hostapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-p4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-bundled-gems-rpmhelper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugin-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zenmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm-vulnerable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-1600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns1605</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns1605-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs1601</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs1601-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc1606</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc1606-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc1600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg1600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libns1604</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libns1604-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysuser-shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysuser-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-websrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clippy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analysis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-cbindgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustfmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-epiphany-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ia64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-riscv64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-rx-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-spu-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gvedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-plugins-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-smyrna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphviz6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfchangelog0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfrpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfxdr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglusterfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-xalan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-testutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-ctr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libucl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmaxminddb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmaxminddb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmaxminddb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspandsp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspandsp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mmdblookup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spandsp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spandsp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-epiphany</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsass-3_6_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python-ctypes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin-Plugin-iXhash2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-oss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-dmg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ksm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spectre-meltdown-checker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-theme-exfoliation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www-dch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clementine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-pst-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-catalog-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-overlayfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-standalone-formulas-configuration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-syndic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-plugin-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gdb-pretty-printers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-brx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kmr_Latn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-my</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-oc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sa_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sw_TZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-0_4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-1_4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-an</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-an_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_AE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_BH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_DZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_EG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_IQ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_JO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_KW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_MA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_OM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_QA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_TN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_YE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-be_BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bg_BG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_BD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bo_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bo_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-br_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs_BA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_AD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-cs_CZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-da_DK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_DE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dictionaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-el_GR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_JM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_MW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_PH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_TT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_BO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_DO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_EC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_GT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_HN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_MX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_NI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_SV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_UY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-et_EE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_LU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_MC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gd_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gl_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gu_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gug_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-he_IL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hi_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hr_HR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-id_ID</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-is_IS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-it_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kmr_Latn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kmr_Latn_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kmr_Latn_TR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lo_LA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lt_LT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lv_LV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nb_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ne_NP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_NL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nn_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-oc_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pl_PL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_AO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro_RO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-si_LK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sk_SK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sl_SI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sq_AL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_FI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_SE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sw_TZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-th_TH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-tr_TR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-uk_UA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi_VN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zu_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libixion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-liborcus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimdal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheimdal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-dane-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-dane0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.11-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.12-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.12-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-requests-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingacli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-HTMLPurifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-JShrink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-Parsedown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-dompdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-lessphp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icingaweb2-vendor-zf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-Icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>teeworlds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-csharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-mini-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-tools-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_authn_sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_maxminddb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_vhostdb_pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tmux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aubio-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaubio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaubio5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaubio5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-aubio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-aubio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlccore9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-codec-gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-noX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-vdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear-Archive_Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-testresults</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdesktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u2f-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-ncurses-pkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-ncurses-pkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-ncurses-pkg9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-qt-pkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-qt-pkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyui-qt-pkg9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-aptitude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-needs-restarting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt_modplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt_modplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpt123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lwresd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-160-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns169</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns169-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs160-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc166</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc166-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc160-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg160-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblwres160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblwres160-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-profile-tti35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftbench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgamma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftinspect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftlint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftmulti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftvalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-azure-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-azure-agent-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-itsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-comicsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceDocument-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceView-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-testresults</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdbserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendfax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mspack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-amt_ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-plugin-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-godbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mydns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dsdb-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>messagelib-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-httpie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-imagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-pubcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-urllib3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>singularity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-ci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-ev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-loadjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-logcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-milters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-chameleon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-default-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-default-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-pagureio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-srcfpo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-theme-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pagure-webhook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-esr-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmosquitto1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmosquittopp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_u2f</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_image-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_image-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2_image-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-afc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclammspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreshclam2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neovim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neovim-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>znc-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-Q16-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick-Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick3-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand-Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calamares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calamares-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>calamares-webview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-virt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-virt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Authen-SASL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-SMTP-SSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetds-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libct4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsybdb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdsodbc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_image-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_image-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_image-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qbittorrent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qbittorrent-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libre2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libre2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>re2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-gcc9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-newlib9-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmcpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp5_6_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp5_6_5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv3_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>schismtracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconf_update5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kconfig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigCore5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigGui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5ConfigGui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Werkzeug-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmirage11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-libmirage-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-x11vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>srt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>srt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvarnishapi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bird-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bird-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bird6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat-isag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rpyc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpyc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhunspell-1_6-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhunspell-1_6-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-excon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-excon-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-excon-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-omamqp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-omhttpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-omtcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>putty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuwac0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwac0-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtomcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtomcrypt-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtomcrypt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntlm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntlm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdal20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-gdal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-GDAL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-GDAL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-rasterizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-slideshow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-squiggle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-svgpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-ttf2svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-iterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer-test-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apt-cacher-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2-installation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound-devel-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-typed-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsingularity1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>singularity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbsd-ctor-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbsd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbsd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-mymachines-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-coredump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-container-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-coredump-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prboom-plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb_plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbprivate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions-zypp-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmunge2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmunge2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mininews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_gui2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_import1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_mmv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_trace2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_web1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-collectl2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-ganglia2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-activemq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bind2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cifs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dbping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-infiniband</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lmsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustrecomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-memcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nfsclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nutcracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nvidia-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-papi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-roomtemp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-shping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-summary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-vmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-weblog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zimbra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-bundler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-root</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-KHR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-gallium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-gallium-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libOpenCL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libVulkan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libva</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_radeonsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_radeonsi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_intel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_radeon-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshadowsocks-libev2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadowsocks-libev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadowsocks-libev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadowsocks-libev-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblxc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblxc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_cgfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-plugin-process-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy_1_16_1-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy_1_16_1-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_16_1-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_16_1-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SQLAlchemy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libBasicUsageEnvironment1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libUsageEnvironment3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgroupsock8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libliveMedia66</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie-anacron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmis-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-c-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_15-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-0_3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_15-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-szl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-librelogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-1_5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spdlog-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstFft-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformHeaders-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-18_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-dashboard-e2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-grafana-dashboards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-diskprediction-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-diskprediction-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-k8sevents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-rook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mgr-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-mon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-osd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-prometheus-alerts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-radosgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cephfs-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradospp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-argparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rados-objclass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dfu-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwupd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Fwupd-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-puma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crawl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crawl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crawl-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-java-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-phpfrontend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audacity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audacity-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-markdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqliteodbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqliteodbc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minidlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alevtd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>motv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tv-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v4l-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xawtv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-newlib10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-d-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvptx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli-fb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.13-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.13-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neomutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_cifscreds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinput0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinput0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chocolate-doom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chocolate-doom-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hylafax+</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hylafax+-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfaxutil7_0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkerfuffle18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>balsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>balsa-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fossil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kleopatra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kleopatra-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Flask-Cors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeconnect-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeconnect-kde-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-jupyter_notebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-jupyter_notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-jupyter_notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-jupyter_notebook-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jupyter_notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jupyter_notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jupyter_notebook-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pngcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sddm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rclone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rclone-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rclone-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blosc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblosc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-autobahn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-autobahn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpainter0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librfxencode0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool-bmc-snmp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionview-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionview-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-rtsp-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtspserver-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtspServer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bleach</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storeBackup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openfortivpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libptexenc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsynctex1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexlua52-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexluajit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-biber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a2ping-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accfonts-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adhocfilelist-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afm2pl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aleph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amstex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arara-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autosp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biber-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibexport-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex8-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexu-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bundledoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cachepic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkcites-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checklistings-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chktex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-gs-integrate-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-bibtexextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-binextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-formatsextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-games</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-humanities</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langarabic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langchinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langcjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langcyrillic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langczechslovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langenglish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langeuropean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langfrench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langgerman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langitalian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langjapanese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langkorean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langother</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langpolish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langportuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langspanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-mathscience</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-music</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-pictures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-plaingeneric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-publishers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-convbkmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossrefware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cslatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanify-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanupload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-de-macro-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-detex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diadia-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dosepsbin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviasm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvicopy-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvidvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviinfox-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviljk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipos-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebong-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exceltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extratools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fig4latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-findhyph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontinst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragmaster-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getmap-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lacheck-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-git-log-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-papersize-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2nemeth-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileversion-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexindent-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexpand-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcdftypetools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listbib-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-ext-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lollipop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltximg-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua2dox-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-m-tx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-make4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makedtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-match_parens-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mf2pt1-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflua-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkgrkindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkjobtexmf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibibliography-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtnt-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omegaware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pax-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfbook2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcrop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfjam-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflatexpicscale-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfxup-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pedigree-perl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petri-nets-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pfarrei-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-helper-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmxchords-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2pk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fontmaps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptexenc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-purifyeps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pygmentex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythontex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rubik-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-gust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-infraonly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-medium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seetexk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcredact-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sty2dtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-multi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ebook-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texcount-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdef-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdirflatten-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texfot-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texliveonfly-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texloganalyser-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texluajit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texosquery-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texsis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpic2pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ttfutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeoutfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulqda-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uplatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urlbst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vlna-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vpe-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-web-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yplan-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfaxutil7_0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activesupport-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activesupport-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-modem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-compute-engine-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-compute-engine-oslogin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-compute-engine-oslogin-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weechat-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcmu2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner-handler-rbd</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <signature_keyid operation="equals">b88b2fd43dbdc284</signature_keyid>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009068342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">15.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.11-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-lp151.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-lp151.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.7-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.7-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.639-lp151.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-lp151.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.21q-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.16-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-lp151.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-lp151.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-lp151.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.52-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.1-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.1-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.2-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.70-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-lp151.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.80.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.80.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp151.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp151.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-lp151.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6b-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6b-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.168-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.168-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.168-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.12-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.12-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.10-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.10-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.52.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.0-lp151.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.0-lp151.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-lp151.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.02-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.15-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.10-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.1_ce-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.1_ce-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2800_fc5a7d91d54c-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc8+gitr3826_425e105d5a03-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-lp151.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.13-lp151.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.13-lp151.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.15-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.96-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.6-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.6-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.6-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.05-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190618-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.1_02-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.1_02-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1.1-lp151.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp151.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-lp151.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp151.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.1_04-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.1_04-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.5-lp151.5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.5-lp151.5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-lp151.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-lp151.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-lp151.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.6-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.6-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.09.6_ce-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.09.6_ce-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190401-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-lp151.5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-lp151.5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.6a-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.69-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.69-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.5.2-lp151.3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.5.2-lp151.3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190423-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190423-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.09.6_ce-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.09.6_ce-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2726_872f0a83c98a-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc6+gitr3804_2b18fe1d885e-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.9-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.4-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-lp151.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.54-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1c-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:75.0.3770.142-lp151.2.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-lp151.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.9-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.9-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45.27-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45.27-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.15.0-lp151.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.30-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.30-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.87.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.19-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.19-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.17-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.17-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-lp151.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-lp151.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-lp151.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.21-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.45-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.2-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.29-lp151.2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.30-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.33-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.33-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0+20180128.1bd86963-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0+20180128.1bd86963-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.37-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-lp151.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-lp151.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.88-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0+git.1558595666.5f79f9e9-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.0-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.0-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.0-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.8-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.187.71edee57d5a-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.187.71edee57d5a-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.187.71edee57d5a-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.6-lp151.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.0-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.41-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.210.ab0549acb05-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.210.ab0549acb05-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.210.ab0549acb05-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.3-lp151.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.3-lp151.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.15-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.01-lp151.6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191112a-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.16-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.4-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0+20180128.1bd86963-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0+20180128.1bd86963-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-lp151.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.1-lp151.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-lp151.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-lp151.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-lp151.2.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.1-lp151.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.7-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-lp151.7.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp151.7.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-lp151.7.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-lp151.7.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp151.7.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-lp151.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-lp151.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.11-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.9.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.176.375e1f05788-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.176.375e1f05788-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.176.375e1f05788-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.2.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.2.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.2.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11-lp151.2.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-lp151.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.74.3-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-lp151.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-lp151.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3+20190326.a521604-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3+20190326.a521604-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.08.9-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.9.0-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-lp151.9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-lp151.9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.29-lp151.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.01-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.16.0-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.16.0-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-lp151.4.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-lp151.4.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.27-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.16-lp151.4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.9.2-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.9.2-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12+hg695-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12+hg695-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-lp151.9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-lp151.9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:77.0.3865.75-lp151.2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:77.0.3865.90-lp151.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:77.0.3865.120-lp151.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.3904.70-lp151.2.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190901-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190901-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.3904.87-lp151.2.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:65.0.3467.62-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.3904.108-lp151.2.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:79.0.3945.79-lp151.2.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:79.0.3945.88-lp151.2.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.88-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5+git0.d905f49a-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.1+r275405-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.1+git1296-lp151.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.1+git1296-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.1+r275405-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.1+r275405-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.1+git1296-lp151.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.6a-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190805-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017+git1510945757.b2662641d5-lp151.11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55.0-lp151.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55.0-lp151.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.38-lp151.9.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.38-lp151.9.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.55.0-lp151.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.38-lp151.9.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.13-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.19-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.19-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.19-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.224.86a8e66adea-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.224.86a8e66adea-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.224.86a8e66adea-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.243.e76c5cb3d97-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.243.e76c5cb3d97-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.243.e76c5cb3d97-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-lp151.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1.1-lp151.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp151.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-lp151.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp151.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0i-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0i-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0i-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0i-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0i-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0i-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.0.14-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.88-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-lp151.6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-lp151.6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.14-lp151.10.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-lp151.2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.29-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.5-lp151.2.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.59.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.5_ce-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.5_ce-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-lp151.6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-lp151.6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53-lp151.2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53-lp151.2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-lp151.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-lp151.2.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.33.1-lp151.6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.73-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.19-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.19-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0~rc4-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.2.0-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.2.0-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.31-lp151.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:80.0.3987.87-lp151.2.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.10+git0.ac198b92-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.10-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-lp151.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.14-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.14-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.10-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.19.0-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.33-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.33-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.60-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.60-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.15-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.10-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-lp151.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.3-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.3-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.1_06-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.1_06-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-lp151.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.29-lp151.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-lp151.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-lp151.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:234-lp151.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.8-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.8-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.8-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-lp151.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-lp151.2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:80.0.3987.149-lp151.2.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.1-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1.4-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-lp151.6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-lp151.6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.5.0-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.639-lp151.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.19-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.29-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.29-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4.0-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4.0-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5.0-lp151.3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5.0-lp151.3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.169.1-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.165.4-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181116-lp151.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20181116-lp151.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181116-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20181116-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.13-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.13-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.4-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.29-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2+20180130.0d9c74212-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2+20180130.0d9c74212-lp151.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190513-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.3.2-lp151.23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.3.2-lp151.23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-lp151.23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-lp151.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-lp151.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:75.0.3770.90-lp151.2.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:79.0.3945.117-lp151.2.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200101-lp151.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200101-lp151.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:76.0.3809.87-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:76.0.3809.100-lp151.2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:76.0.3809.132-lp151.2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-lp151.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-lp151.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.2-lp151.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.14-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.14-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.06.28-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:87.0.4280.66-lp151.2.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.4-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.4-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.4-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.16.3-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.16.3-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.16.1-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.16.1-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-lp151.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-lp151.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190618-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7.1-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7.1-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.0-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.3-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.3.2-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.3.2-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20191016-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191016-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.3-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200602-lp151.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.3_04-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.3_04-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:81.0.4044.129-lp151.2.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-lp151.2.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-lp151.2.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-lp151.2.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp151.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp151.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp151.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp151.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2-lp151.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2-lp151.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2-lp151.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-lp151.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-lp151.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-lp151.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.5.12-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.8-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.8-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.317.6d82fb3918b-lp151.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.317.6d82fb3918b-lp151.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.317.6d82fb3918b-lp151.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-lp151.21.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-lp151.21.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.3-lp151.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.3-lp151.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.3_k4.12.14_lp151.28.48-lp151.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.343.4bc358522a9-lp151.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.343.4bc358522a9-lp151.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.343.4bc358522a9-lp151.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.9.970+ged84cae0c9-lp151.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.9.970+ged84cae0c9-lp151.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.7-lp151.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.10-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-lp151.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-lp151.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.30-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.10+git0.ac198b92-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-lp151.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-lp151.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-lp151.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-lp151.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2_04-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2_04-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.31-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.31-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.33-lp151.8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.33-lp151.8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.33-lp151.8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.33-lp151.8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp151.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9996-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11.3-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.29-lp151.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp151.10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-lp151.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-lp151.2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-lp151.2.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-lp151.2.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-lp151.2.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-lp151.2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-lp151.2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-lp151.2.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.10.0-lp151.2.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.29-lp151.4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.10-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.08.9-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.4.2-lp151.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.4.2-lp151.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.5.2-lp151.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.5.2-lp151.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-lp151.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-lp151.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-lp151.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.8-lp151.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.8-lp151.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.32-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.32-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.11_ce-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.11_ce-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2902_153d0769a118-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc10+gitr3981_dc9208a3303f-lp151.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.11.1-lp151.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.11.1-lp151.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.3-lp151.2.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.3-lp151.2.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.3-lp151.2.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.8-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.103-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-lp151.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-lp151.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-lp151.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-lp151.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.25-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.25-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.49-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp151.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp151.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-lp151.2.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.14-lp151.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.7-lp151.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201120-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20201120-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.9p1-lp151.4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.9p1-lp151.4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.14-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.12-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.383.7b7f8f14df8-lp151.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.383.7b7f8f14df8-lp151.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.383.7b7f8f14df8-lp151.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-lp151.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-lp151.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-lp151.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-lp151.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-lp151.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.9-lp151.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.9-lp151.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.9_k4.12.14_lp151.28.67-lp151.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.639-lp151.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8.0-lp151.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8.0-lp151.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.24-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.24-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.24_k4.12.14_lp151.28.67-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.373.26895a83dbf-lp151.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.373.26895a83dbf-lp151.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5+git.373.26895a83dbf-lp151.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11-lp151.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11-lp151.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.36-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.36-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9.0-lp151.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9.0-lp151.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-lp151.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-lp151.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.4-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.3-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.9-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-lp151.2.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.11.0-lp151.2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-lp151.2.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.12.0-lp151.2.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-lp151.2.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-lp151.2.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-lp151.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-lp151.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-lp151.2.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-lp151.2.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-lp151.21.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-lp151.21.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.0-lp151.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.0-lp151.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp151.10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-lp151.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.8-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.8-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:85.0.4183.102-lp151.2.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:71.0.3770.228-lp151.2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:85.0.4183.121-lp151.2.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:86.0.4240.75-lp151.2.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1807-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:87.0.4280.141-lp151.2.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:73.0.3856.344-lp151.2.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-lp151.2.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-lp151.2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:86.0.4240.111-lp151.2.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:72.0.3815.320-lp151.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:86.0.4240.183-lp151.2.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:86.0.4240.198-lp151.2.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:72.0.3815.400-lp151.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:87.0.4280.88-lp151.2.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:73.0.3856.284-lp151.2.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-lp151.2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-lp151.2.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-lp151.2.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-lp151.2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:88.0.4324.96-lp151.2.171.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.3-lp151.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-lp151.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-lp151.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2.1-lp151.16.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2.1-lp151.16.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-lp151.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.15-lp151.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-lp151.5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-lp151.5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.5.382+g8881d33957-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.5.382+g8881d33957-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-lp151.26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-lp151.26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:234-lp151.26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-lp151.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-lp151.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200727-lp151.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-lp151.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-lp151.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-lp151.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.8-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp151.19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp151.19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp151.19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-lp151.19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-lp151.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.5.389+gb0f23ac248-lp151.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.5.389+gb0f23ac248-lp151.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.33-lp151.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.33-lp151.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.1-lp151.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.1-lp151.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-lp151.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0i-lp151.8.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0i-lp151.8.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.23.1-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.23.1-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-lp151.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0i-lp151.8.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1.1-lp151.7.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-lp151.7.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-lp151.7.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-lp151.7.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-lp151.6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.9-lp151.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.3-lp151.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.3-lp151.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp151.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp151.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-lp151.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1+20190417.13d370ca9-lp151.2.16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1+20190417.13d370ca9-lp151.2.16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.13.450+g65ea1b614d-lp151.2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.13.450+g65ea1b614d-lp151.2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-lp151.28.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-lp151.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170731-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170731-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp151.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-lp151.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-lp151.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-lp151.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp151.10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6.0-lp151.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6.0-lp151.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-lp151.10.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.7-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-lp151.2.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.2-lp151.2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-lp151.2.88.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-lp151.8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.22-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.22-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.7.0-lp151.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.7.0-lp151.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-lp151.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-lp151.7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.4_04-lp151.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.4_04-lp151.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.3_10-lp151.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.3_10-lp151.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.08.9-lp151.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.16.402+g7d47dbaf4d-lp151.2.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.16.402+g7d47dbaf4d-lp151.2.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.0-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.12-lp151.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.3-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.3-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.4_06-lp151.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.4_06-lp151.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0+git.1611141202.2fe6369e-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0+git.1607075079.a25648d8-lp151.2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.10.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-lp151.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-lp151.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-lp151.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170731-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170731-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:79.0.3945.130-lp151.2.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:80.0.3987.122-lp151.2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:80.0.3987.132-lp151.2.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:81.0.4044.92-lp151.2.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:81.0.4044.113-lp151.2.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.0.3618.63-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:83.0.4103.97-lp151.2.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:81.0.4044.138-lp151.2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.0.3618.104-lp151.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:83.0.4103.106-lp151.2.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:83.0.4103.116-lp151.2.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:69.0.3686.49-lp151.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4147.89-lp151.2.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:70.0.3728.71-lp151.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4147.105-lp151.2.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:70.0.3728.133-lp151.2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4147.125-lp151.2.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.0.4147.135-lp151.2.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10-lp151.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-lp151.2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-lp151.2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-lp151.2.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-lp151.2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-lp151.2.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-lp151.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.36.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.36.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.5-lp151.6.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.88-lp151.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.3-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0beta2-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30357-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn27321-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn12688-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn28038-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44143-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn3006-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29036-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43843-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18790-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42679-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16219-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17794-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15543-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25623-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38300-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37223-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41616-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44385-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44515-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42330-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn43356-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn35830-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn37105-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44177-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42992-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42268-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44496-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42675-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn43009-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44401-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn32550-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn43650-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44414-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn40375-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42045-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44192-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn30372-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44554-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42106-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44371-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn30962-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn40587-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41614-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44544-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44500-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44396-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44297-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn40561-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44395-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44460-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44485-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn43059-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34112-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30408-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43866-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33902-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24061-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23866-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29741-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17399-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37645-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24759-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29031-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn8329-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44515-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40273-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40987-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21000-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29050-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18336-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25860-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14752-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14758-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25997-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13663-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34971-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37813-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32101-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14050-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30983-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42296-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42300-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16420-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25012-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32150-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn10937-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn27025-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn31696-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn26126-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15093-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn41465-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29005-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32346-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29053-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34647-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44549-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43292-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37750-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38769-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23500-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23661-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23406-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14428-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn8457-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33688-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18674-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30534-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37026-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn10843-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37537-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14387-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17868-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn41779-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40690-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25962-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16181-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn39165-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29348-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13364-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn22859-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32405-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn7838-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29333-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44206-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29335-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34996-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn31638-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32919-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn25923-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn35799-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41515-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn13822-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41825-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44187-lp151.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29688-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38710-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21215-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43957-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37771-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13013-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21802-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15506-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn12782-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33155-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24062-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43596-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn6898-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25648-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn26326-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23262-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn6897-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44361-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34398-lp151.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.35-lp151.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp151.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.3-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.2-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.4-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-lp151.10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-lp151.10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-lp151.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.0-lp151.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-lp151.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.0-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.0-lp151.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.60.0-lp151.5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10-lp151.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-lp151.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.4-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201118-lp151.2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190801-lp151.2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190801-lp151.2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190801-lp151.2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-lp151.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6c-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6c-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.35-lp151.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-lp151.2.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-lp151.2.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-lp151.2.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-lp151.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.14-lp151.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-lp151.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp151.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009144625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-lp151.2.15.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
